SlideShare a Scribd company logo
1 of 225
Performance MNIST Special Publication 800-55 Revision 1
easurement Guide
for Information Security
Elizabeth Chew, Marianne Swanson, Kevin Stine,
Nadya Bartol, Anthony Brown, and Will Robinson
I N F O R M A T I O N S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8930
July 2008
U.S. Department of Commerce
Carlos M. Gutierrez, Secretary
National Institute of Standards and Technology
James M. Turner, Deputy Director
Reports on Computer Systems Technology
nd Technology
ship for the Nation’s
ce data, proof of
ductive use of
strative,
s for the cost-effective security and privacy of sensitive
unclassified information in federal computer systems. This
Special Publication 800-series reports on ITL’s
research, guidelines, and outreach efforts in information
security, and its collaborative activities with
industry, government, and academic organizations.
The Information Technology Laboratory (ITL) at the National
Institute of Standards a
(NIST) promotes the U.S. economy and public welfare by
providing technical leader
measurement and standards infrastructure. ITL develops tests,
test methods, referen
concept implementations, and technical analyses to advance the
development and pro
information technology. ITL’s responsibilities include the
development of management, admini
technical, and physical standards and guideline
ii
Authority
This document has been developed by the National Institute of
Standards and Technology (NIST) in
nagement Act
rements, and for
t such standards and
security systems. This guideline is consistent with the
requirements
ency
s. Supplemental
vided in A-130, Appendix III.
y nongovernmental
tion would be
Nothing in this document should be taken to contradict
standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce
under statutory authority. Nor should these
guidelines be interpreted as altering or superseding the existing
authorities of the Secretary of
Commerce, Director of the OMB, or any other federal official.
furtherance of its statutory responsibilities under the Federal
Information Security Ma
(FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines,
including minimum requi
providing adequate information security for all agency
operations and assets, bu
guidelines shall not apply to national
of the Office of Management and Budget (OMB) Circular A-
130, Section 8b(3), Securing Ag
Information Systems, as analyzed in A-130, Appendix IV:
Analysis of Key Section
information is pro
This guideline has been prepared for use by federal agencies. It
may also be used b
organizations on a voluntary basis and is not subject to
copyright regulations. (Attribu
appreciated by NIST.)
Certain commercial entities, equipment, or materials may be
identified in this
document in order to describe an experimental procedure or
concept adequately.
Such identification is not intended to imply recommendation or
endorsement by NIST,
nor is it intended to imply that the en materials, or equipment
are necessarily the
best available for the purpose.
tities,
iii
Acknowledgements
zabeth Lennon (NIST),
) who reviewed
gratefully
ciate the many contributions from individuals and organizations
in the
public and private sectors whose thoughtful and constructive
comments improved the quality and
usefulness of this publication.
The authors wish to thank Joan Hash (NIST), Arnold Johnson
(NIST), Eli
Karen Scarfone (NIST), Kelley Dempsey (NIST), and Karen
Quigg (MITRE
drafts of this document and/or contributed to its development.
The authors also
acknowledge and appre
iv
T A B L E O F C O N T E N T S
E ................... VIII
................... ......1
.................. .....1
.................. .....2
.................. .....2
..........................4
.....................5
R .................. .....6
................... ......6
................... ......6
.................. .....7
................... ......8
................... ......8
................... ......8
3. .................. .....9
.................. .....9
.................. ...10
.................. ...11
.................. ...13
.................. ...13
.................. ...14
.................. ...15
.................. ...15
................... ....16
................... ....16
.................. ...17
.................. ...17
3 .................. ...17
.................. ...19
L ................... ....20
4.1 Legislative
Considerations.........................................................................
....................20
4.1.1 Government Performance Results
Act.......................................................................20
4.1.2 Federal Information Security Management Act
........................................................21
4.2 Federal Enterprise Architecture
.....................................................................................22
4.3 Linkage Between Enterprise Strategic Planning and
Information Security ..................23
5. MEASURES DEVELOPMENT
PROCESS......................................................................24
5.1 Stakeholder Interest Identification
.................................................................................25
XECUTIVE SUMMARY
.............................................................................. . ...
..
..
..
..
..
..
..
..
2.4 Program Manager/Information System
Owner...................................... .
....
....
....
....
....
....
....
....
....
....
....
....
....
....
....
....
....
....
1.
INTRODUCTION....................................................................
................. . .
1.1 Purpose and Scope
.............................................................................. . ...
1.2 Audience
............................................................................................. .
...
...
1.3
History....................................................................................
............. .
1.4 Critical Success Factors
...............................................................................................
....3
1.5 Relationship to Other NIST Documents
................................................
1.6 Document Organization
..............................................................................
2. OLES AND
RESPONSIBILITIES....................................................... . ...
2.1 Agency
Head.......................................................................................
. .
2.2 Chief Information Officer
.................................................................. . .
2.3 Senior Agency Information Security
Officer...................................... . ...
2.5 Information System Security
Officer................................................ . .
2.6 Other Related Roles
.......................................................................... . .
INFORMATION SECURITY MEASURES
BACKGROUND.......... . ...
3.1 Definition
............................................................................... ........... .
...
3.2 Benefits of Using Measures
.............................................................. .
...
...
3.3 Types of Measures
............................................................................ .
...3.3.1 Implementation Measures
............................................................. .
...3.3.2 Effectiveness/Efficiency Measures
............................................... .
...3
...
.3.3 Impact Measures
........................................................................... .
...3.4 Measurement
Considerations............................................................ .
3.4.1 Organizational
Considerations...................................................... .
.
3.4.2 Manageability
...............................................................................................
.............15
3.4.3 Data Management Concerns
......................................................... .
3.4.4 Automation of Measurement Data Collection
.............................. . .
3.5 Information Security Measurement Program
Scope......................... .
3 ...
...
.5.1 Individual Information
Systems.................................................... .
....5.2 System Development Life Cycle
.................................................. .
...3.5.3 Enterprise-Wide
Programs............................................................ .
.4. EGISLATIVE AND STRATEGIC DRIVERS
.................................. .
v
5.2 Goals and Objectives Definition
....................................................... . .......
....
....
....
....
....
....
....
....
IO
....
....
......
.....
......
.................. ...26
.................. ...27
.................. ...27
.................. ...28
.................. ...29
5 .................. ...29
5 ................... ....30
................... ....31
.................. ...33
I N ....................35
.................. ...35
.................. ...36
.................. .38
.................. .38
...................
APPENDIX B: ACRONYMS
...............................................................................................
....B-1
APPENDIX C:
REFERENCES.........................................................................
...................... C-1
APPENDIX D: SPECIFICATIONS FOR MINIMUM SECURITY
REQUIREMENTS . D-1
5.3 Information Security Policies, Guidelines, and Procedures
Review . ...
5.4 Information Security Program Implementation
Review................... .
...
...
5.5 Measures Development and Selection
.............................................. .
...5.5.1 Measures Development Approach
................................................ .
....5.2 Measures Prioritization and Selection
.......................................... .
..5.3 Establishing Performance Targets
................................................ .
5.6 Measures Development
Template..................................................... . .
5.7 Feedback Within the Measures Development Process
..................... . ...
6. NFORMATION SECURITY MEASUREMENT
IMPLEMENTAT
6.1 Prepare for Data Collection
.............................................................. . ...
6.2 Collect Data and Analyze
Results..................................................... . ...
6.3 Identify Corrective
Actions............................................................. . .....
6.4 Develop Business Case and Obtain Resources
................................ . .....
6.5 Apply Corrective Actions
..............................................................................................
40
APPENDIX A: CANDIDATE MEASURES
.............................................. . .. A-1
vi
L I S T O F F I G U R E S
.................. .....3
................... ....25
Figure 5-2. Information Security Measures Trend Example
.........................................................31
Figure 6-1. Information Security Measurement Program
Implementation Process ......................35
Table 1. Measurement During System Development
....................................................................18
Table 2. Measures Template and Instructions
...............................................................................32
Figure 1-1. Information Security Measurement Program
Structure ................. .....
nt
....
...
Figure 3-1. Information Security Program Maturity and Types
of Measureme .........................12
Figure 5-1. Information Security Measures Development
Process .................. . .
L I S T O F T A B L E S
vii
EXECUTIVE SUMMARY
entation of measures
ate the
upporting information
prove performance,
levant
cy, and
’s success in
rocess described in this guide
tionship between
agency mission,
n Act, the
k Elimination Act
t (FISMA)—cite information
nce measurement in
tion to legislative compliance, agencies can use performance
measures as management tools in their internal improvement
efforts and link implementation of
ts.
ent and implementation of an
d numbers);
information security processes should be considered for
measurement;
d directing resources.
easures are
This document focuses on the development and collection of
three types of measures:
• Implementation measures to measure execution of security
policy;
• Effectiveness/efficiency measures to measure results of
security services delivery; and
• Impact measures to measure business or mission consequences
of security events.
This document is a guide to assist in the development, selection,
and implem
to be used at the information system and program levels. These
measures indic
effectiveness of security controls applied to information
systems and s
security programs. Such measures are used to facilitate
decision making, im
and increase accountability through the collection, analysis, and
reporting of re
performance-related data—providing a way to tie the
implementation, efficien
effectiveness of information system and program security
controls to an agency
achieving its mission. The performance measures development
p
will assist agency information security practitioners in
establishing a rela
information system and program security activities under their
purview and the
helping to demonstrate the value of information security to their
organization.
A number of existing laws, rules, and regulations—including
the Clinger-Cohe
Government Performance and Results Act (GPRA), the
Government Paperwor
(GPEA), and the Federal Information Security Management Ac
performance measurement in general, and information security
performa
particular, as a requirement. In addi
their information security programs to agency-level strategic
planning effor
The following factors must be considered during developm
information security measurement program:
• Measures must yield quantifiable information (percentages,
averages, an
• Data that supports the measures needs to be readily
obtainable;
• Only repeatable
and
• Measures must be useful for tracking performance an
The measures development process described in this document
ensures that m
developed with the purpose of identifying causes of poor
performance and pointing to
appropriate corrective actions.
viii
ix
ful for
ent types of
ary focus of information security measures shifts
as the implementation of security controls matures.
The types of measures that can realistically be obtained, and
that can also be use
performance improvement, depend on the maturity of the
agency’s information security program
and the information system’s security control implementation.
Although differ
measures can be used simultaneously, the prim
1. INTRODUCTION
gulatory, financial,
ions cite information
ent in
e Clinger-Cohen Act, the Government
mination Act (GPEA), and
tion security
rformance
sures as
on of their
rmation security
and accountability
ata. They provide
ty controls to an
in its mission-critical activities. The performance measures
development
is document will assist agency information security
practitioners in
ship between information system and program security activities
under
f information security
plementation of
elated activities. It
entifies the adequacy
h to help
es, identify and
ontrols for continuous
cesses and how
nd support risk-
program can
and should
entation of such a
program assists agencies in meeting the annual requirements of
the Office of Management and
Budget (OMB) to report the status of agency information
security programs.
NIST Special Publication (SP) 800-55, Revision 1, expands
upon NIST’s previous work in the
field of information security measures to provide additional
program-level guidelines for
quantifying information security performance in support of
organizational strategic goals. The
processes and methodologies described in this document link
information system security
performance to agency performance by leveraging agency-level
strategic planning processes. By
doing so, the processes and methodologies help demonstrate
how information security
The requirement to measure information security performance is
driven by re
and organizational reasons. A number of existing laws, rules,
and regulat
performance measurement in general, and information security
performance measurem
particular, as a requirement. These laws include th
Performance and Results Act (GPRA), the Government
Paperwork Eli
the Federal Information Security Management Act (FISMA).
While these laws, rules, and regulations are important drivers
for informa
measurement, equally compelling are the benefits that
information security pe
measurement can yield for organizations. Agencies can use
performance mea
management tools in their internal improvement efforts and link
implementati
information security programs to agency-level strategic
planning efforts. Info
measures are used to facilitate decision making and improve
performance
through collection, analysis, and reporting of relevant
performance-related d
the means for tying the implementation, efficiency, and
effectiveness of securi
agency’s success
process described in th
establishing a relation
their purview and the agency mission, helping to demonstrate
the value o
to their organization.
1.1 Purpose and Scope
This document is a guide for the specific development,
selection, and im
information system-level and program-level measures to
indicate the implementation,
efficiency/effectiveness, and impact of security controls, and
other security-r
provides guidelines on how an organization, through the use of
measures, id
of in-place security controls, policies, and procedures. It
provides an approac
management decide where to invest in additional information
security resourc
evaluate nonproductive security controls, and prioritize security
c
monitoring. It explains the measurement development and
implementation pro
measures can be used to adequately justify information security
investments a
based decisions. The results of an effective information security
measurement
provide useful data for directing the allocation of information
security resources
simplify the preparation of performance-related reports.
Successful implem
1
contributes to accomplishing agency strategic goals and
objectives. Performance m
developed according to this guide will enhance the a
easures
bility of agencies to respond to a variety of
mended Security
at support the
s on developing
r, expand, or use
ile focused on NIST SP 800-53 security controls,
measures related to
an be helpful in
ta collection, analysis,
ored to support FISMA performance measures,
e Architecture’s (FEA) Performance Reference Model (PRM)
requirements,
and any other enterprise-specific requirements for reporting
quantifiable information about
written primarily for Chief Information Officers (CIOs), Senior
Agency
Information Security Officers (SAISOs)—often referred to as
Chief Information Security
SOs)—and Information System Security Officers (ISSOs). It
targets individuals
who are familiar with security controls as described in NIST SP
800-53. The concepts,
vernment and
ness has been under development for
, and
tion Security, both
e publications by
building upon them to align this approach with security controls
provided in NIST SP 800-53,
Recommended Security Controls for Federal Information
Systems. The document also expands
0-55 to assist with
the assessment of information security program implementation.
Security control implementation for information systems and
information security programs is
reviewed and reported annually to OMB in accordance with the
Electronic Government Act of
2002, which includes FISMA. The Act requires departments and
agencies to demonstrate that
federal government mandates and initiatives, including FISMA.
This publication uses the security controls identified in NIST
SP 800-53, Recom
Controls for Federal Information Systems, as a basis for
developing measures th
evaluation of information security programs. In addition to
providing guideline
measures, the guide lists a number of candidate measures that
agencies can tailo
as models for developing other measures.1 Wh
the process described in this guide can be applied to develop
agency-specific
security controls that are not included in NIST SP 800-53.
The information security measurement program described in
this document c
fulfilling regulatory requirements. The program provides an
underlying da
and reporting infrastructure that can be tail
Federal Enterpris
information security performance.
1.2 Audience
This guide is
Officers (CI
processes, and candidate measures presented in this guide can
be used within go
industry contexts.
1.3 History
The approach for measuring security control effective
several years. NIST SP 800-55, Security Metrics Guide for
Information Technology Systems
NIST Draft SP 800-80, Guide to Developing Performance
Metrics for Informa
addressed information security measurement. This document
supersedes thes
on concepts and processes introduced in the original version of
NIST SP 80
1 Candidate measures offered by this guide do not constitute
mandatory requirements. Rather, they provide a sampling of
measures to be considered for use by the readers of this guide.
2
they are meeting applicable information security requirements,
and to document the level of
performance based on results of annual program reviews.
An information security measurement program within an
organization should include four
interdependent components (see Figure 1-1).
1.4 Critical Success Factors
Figure 1-1. Information Security Measurement Program
Structure
This support
ization. Without
trol information
ured by
The second component of an effective information security
measurement program is the
existence of information security policies and procedures
backed by the authority necessary to
enforce compliance. Information security policies delineate the
information security
management structure, clearly assign information security
responsibilities, and lay the foundation
needed to reliably measure progress and compliance. Procedures
document management’s
position on the implementation of an information security
control and the rigor with which it is
applied. Measures are not easily obtainable if no procedures are
in place that supply data to be
used for measurement.
The foundation of strong upper-level management support is
critical, not only for the success of
the information security program, but also for the program’s
implementation.
establishes a focus on information security within the highest
levels of the organ
a solid foundation (i.e., proactive support of personnel in
positions that con
resources), the information security measurement program can
fail when press
organizational dynamics and budget limitations.
3
The third component is developing and establishing quantifiable
performanc
designed to capture and provide meaningful performance data.
To provide meaningful data,
quantifiable information security measures must be based on
information
goals and objectives, and be easily obtainable and feasible to
measure. They m
e measures that are
security performance
ust also be
repeatable, provide relevant performance trends over time, and
be useful for tracking
onsistent periodic
learned, improve
d plan for the implementation of future security
controls to meet new information security requirements as they
occur. Accurate data collection
ningful and useful
d by the degree
rmation security measurement
program should provide substantive justification for decisions
that directly affect the information
se decisions include budget and personnel requests and
should assist in
ance.
ded to assist
ent,
s on quantifying
fforts such as those described in NIST SP
ation Systems;
in NIST SP 800-30,
mmended Security
from NIST SP 800-53A in that it provides a quantitative
approach to measuring and analyzing security controls
implementation and effectiveness at the
information system and program levels, aggregated across
multiple individual efforts. It also
provides an approach for aggregating information from multiple
information systems to measure
and analyze information security from an enterprise-level
perspective. NIST SP 800-53A
provides procedures for assessing if the security controls are
implemented and operating as
intended according to the information system security plan for
the system. The assessment data
produced as a result of applying NIST SP 800-53A assessment
procedures can serve as a data
source for information security measurement.
performance and directing resources.
Finally, the information security measurement program itself
must emphasize c
analysis of the measures data. Results of this analysis are used
to apply lessons
effectiveness of existing security controls, an
must be a priority with stakeholders and users if the collected
data is to be mea
in improving the overall information security program.
The success of an information security program implementation
should be judge
to which meaningful results are produced. A comprehensive
info
security posture of an organization. The
allocation of available resources. An information security
measurement program
the preparation of required reports relating to information
security perform
1.5 Relationship to Other NIST Documents
This document is a continuation in a series of NIST special
publications inten
information management and information security personnel in
the establishm
implementation, and maintenance of an information security
program. It focuse
information security performance based on the results of a
variety of information security
activities. This approach draws upon many sources of data,
including:
• Information security assessment and testing e
800-53A, Guide for Assessing the Security Controls in Federal
Inform
• Information security risk assessments efforts, such as those
described
Risk Management Guide for Information Technology Systems;
and
• Minimum security controls recommended in NIST SP 800-53,
Reco
Controls for Federal Information Systems.
NIST SP 800-55, Revision 1, differs
4
5
inputs into the
anagers; and
• NIST SP 800-65, Integrating IT Security into the Capital
Planning and Investment
sist with prioritization for the continuous monitoring of
bed in NIST SP 800-37, Guide for the Security Certification and
1.6 Document Organization
nsibilities of agency
rity program, and in
uidelines on the
security measures, the benefits of
he factors that
.
y to strategic
rocess used for
usses those factors
tion of an information security measurement program.
This guide contains four appendices. Appendix A, Candidate
Measures, provides practical
examples of information security measures that can be used or
modified to meet specific agency
requirements. Appendix B provides a list of acronyms used in
this document. Appendix C lists
references. Appendix D lists specifications for minimum
security requirements taken from
Federal Information Processing Standard (FIPS) 200, Minimum
Security Requirements for
Federal Information and Information Systems.
Information security measurement results described in this
guide will provide
information security program activities described in a number
of NIST publications, including:
• NIST SP 800-100, Information Security Handbook: A Guide
for M
Control Process.
These measures can also be used to as
security controls, as descri
Accreditation of Federal Information Systems.
The remaining sections of this guide discuss the following:
• Section 2, Roles and Responsibilities, describes the roles and
respo
staff that have a direct interest in the success of the information
secu
the establishment of an information security measurement
program.
• Section 3, Information Security Measures Background,
provides g
background and definition of information
implementation, various types of information security measures,
and t
directly affect success of an information security measurement
program
• Section 4, Legislative and Strategic Drivers, links information
securit
planning through relevant legislation and guidelines.
• Section 5, Measures Development Process, presents the
approach and p
development of information security measures.
• Section 6, Information Security Measurement Implementation,
disc
that can affect the implementa
2. ROLES AND RESPONSIBILITIES
This section outlines the key roles and responsibilities for
developing and imp
information security measures. While information security is
the responsib
of the organization
lementing
ility of all members
, the positions described in Sections 2.1 through 2.6 are key
information
ders that should work to instill a culture of information security
awareness
zation..
urement are as
agency strategic and
al planning processes to secure the organization’s mission;
to annual reporting on the
ation
ent and
gency;
t activities have adequate financial and
human resources for success;
• Actively promoting information security measurement as an
essential facilitator of
y; and
• Approving policy to officially institute measures collection.
2
ollowing responsibilities related to information
• Using information security measures to assist in monitoring
compliance with applicable
information security requirements;
• Using information security measures in annually reporting on
effectiveness of the agency
• Demonstrating management’s commitment to information
security measures
development and implementation through formal leadership;
security stakehol
across the organi
2.1 Agency Head
The specific Agency Head responsibilities related to
information security meas
follows:
• Ensuring that information security measures are used in
support of
operation
• Ensuring that information security measures are integrated in
effectiveness of the agency information security program by the
Chief Inform
Officer (CIO);
• Demonstrating support for information security measures
developm
implementation, and communicating official support to the a
• Ensuring that information security measuremen
information security performance improvement throughout the
agenc
2.2 Chief Information Officer
The Chief Information Officer (CIO) has the f
security measurement:
information security program to the agency head;
2 When an agency has not designated a formal Chief
Information Officer position, FISMA requires the associated
responsibilities
to be handled by a comparable agency official.
6
• Formally communicating the importance of using information
secu
monitor the over
rity measures to
all health of the information security program and to comply
with
ent and implementation;
ion security
ation security
ures data to support policy, resource allocation, budget
decisions, and assessment of
information
measures analysis
king corrective actions such as revising information security
procedures and
urity training to staff; and
• ment, and institute
Officer (SAISO) may
thin this
he CISO. The SAISO has
:
lanning,
, evaluating, and documenting remedial actions to address any
deficiencies
ency;
ation security
information
O’s annual reporting to
ency head on the effectiveness of the agency’s information
security program,
including progress of remedial actions;
• Conducting information security measures development and
implementation;
• Ensuring that a standard process is used throughout the agency
for information security
measures development, creation, analysis, and reporting; and,
• Using information security measures for policy, resource
allocation, and budget
decisions.
applicable regulations;
• Ensuring information security measurement program developm
• Allocating adequate financial and human resources to the
informat
measurement program;
• Reviewing information security measures regularly and using
inform
meas
the information security program posture and operational risks
to agency
systems;
• Ensuring that a process is in place to address issues
discovered through
and ta
providing additional information sec
Issuing policy, procedures, and guidelines to officially
develop, imple
measures.
2.3 Senior Agency Information Security Officer
Depending upon the agency, the Senior Agency Information
Security
sometimes be referred to as the Chief Information Security
Officer (CISO). Wi
document, the term SAISO is used to represent both the SAISO
and t
the following responsibilities related to information security
measurement
• Integrating information security measurement into the process
for p
implementing
in the information security policies, procedures, and practices
of the ag
• Obtaining adequate financial and human resources to support
inform
measurement program development and implementation;
• Leading the development of any internal guidelines or policy
related to
security measures;
• Using information security measures in support of the agency
CI
the ag
7
8
2.4 Program Manager/Information System Owner
ensuring that
nd availability of
information and information systems. The program
manager/information system owner has the
t:
rity measurement program development and
ction and
• Educating staff on the development, collection, analysis, and
reporting of information
quirements,
• Ensuring that measurement data is collected consistently and
accurately and is provided
red;
• Reviewing information security measures data regularly and
using it for policy, resource
s; and
easuring
performance.
t:
information security measurement program development and
collection and
ata or providing measurement data to designated staff that are
collecting,
analyzing, and reporting the data.
2.6 Other Related Roles
Information security measurement may require inputs from a
variety of organizational
components or stakeholders, including incident response,
information technology operations,
privacy, enterprise architecture, human resources, physical
security, and others. Section 5.1 lists
additional stakeholders.
Program managers, as well as information system owners, are
responsible for
proper security controls are in place to address the
confidentiality, integrity, a
following responsibilities related to information security
measuremen
• Participating in information secu
implementation by providing feedback on the feasibility of data
colle
identifying data sources and repositories;
security measures and how it will affect information security
policy, re
resource allocation, and budget decisions;
to designated staff who are analyzing and reporting the data;
• Directing full participation and cooperation of staff, when
requi
allocation, and budget decision
• Supporting implementation of corrective actions, identified
through m
information security
2.5 Information System Security Officer
The Information System Security Officer (ISSO) has the
following responsibilities related to
information security measuremen
• Participating in
implementation by providing feedback on the feasibility of data
identifying data sources and repositories; and
• Collecting d
3. INFORMATION SECURITY MEASURES BACKGROUND
s are and why
defines types
can be used; discusses the key aspects of making an
information security
measurement program successful; and identifies the uses of
measures for management, reporting,
aking.
prove performance
tability through the collection, analysis, and reporting of
relevant performance-related
easured activities and
n observed
nization.
progressively higher levels, depending on the size and
complexity of an organization. While a
ms, such as
he results of data
goals and
n information or
uate information
ance objectives enable
n security policies and
organization.
example goal
training includes
f, and a reference
tion’s information security policies and procedures.
tives by
ols; analyzing the
adequacy of information security program activities; and
identifying possible improvement
actions. During measures development, goals and objectives
from federal guidelines, legislation,
regulations, and enterprise-level guidance are identified and
prioritized to ensure that the
measurable aspects of information security performance
correspond to the operational priorities
of the organization.
Information security measures must yield quantifiable
information for comparison purposes,
apply formulas for analysis, and track changes using the same
points of reference. Percentages
This section provides basic information on what information
security measure
information security performance should be measured.
Additionally, this section
of measures that
and decision m
3.1 Definition
Information security measures are used to facilitate decision
making and im
and accoun
data. The purpose of measuring performance is to monitor the
status of m
facilitate improvement in those activities by applying corrective
actions based o
measurements.
Information security measures can be obtained at different
levels within an orga
Detailed measures, collected at the information system level,
can be aggregated and rolled up to
case can be made for using different terms for more detailed and
aggregated ite
“metrics” and “measures,” this document standardizes on
“measures” to mean t
collection, analysis, and reporting. This document refers to the
process of data collection,
analysis, and reporting as “measurement.”
Information security measures are based on information security
performance
objectives. Information security performance goals state the
desired results of a
security program implementation, such as, “All employees
should receive adeq
security awareness training.” Information security perform
accomplishment of goals by identifying practices defined by
informatio
procedures that direct consistent implementation of security
controls across the
Examples of information security performance objectives,
corresponding to the
cited above, are: All new employees receive new employee
training. Employee
a summary of the Rules of Behavior. Employee training
includes a summary o
to, the organiza
Information security measures monitor the accomplishment of
goals and objec
quantifying the implementation, efficiency, and effectiveness of
security contr
9
or averages are most common. Absolute numbers are sometimes
useful, depending on the
ss that is under
d repeatable
table and stable,
e have not been
n of measurement
esources that may
ities that can provide data for
measurement include risk assessments, penetration testing,
security assessments, and continuous
nd awareness
provide relevant
lied to problem
view performance by observing trends, identifying
and prioritizing corrective actions, and directing the application
of those corrective actions based
available resources. The measures development process,
described
in Section 5, ensures that measures are developed with the
purpose of identifying causes of poor
anizational and
ormation security
nstrating
for resource
countability for
e implemented
lysis processes can
lementation within
cific information systems.
surement program
ystems and
Information security measures can assist with determining the
effectiveness of implemented
information security processes, procedures, and security
controls by relating results of
information security activities and events (e.g., incident data,
revenue lost to cyber attacks) to
security controls and information security investments.
Demonstrate Compliance: Organizations can demonstrate
compliance with applicable laws,
rules, and regulations by implementing and maintaining an
information security measurement
program. Information security measures will assist in satisfying
the annual FISMA reporting
activity that is being measured.
Data required for calculating measures must be readily
obtainable, and the proce
consideration needs to be measurable. Only processes that can
be consistent an
should be considered for measurement. Even though the
processes may be repea
measurable data may be difficult to obtain if the processes and
their performanc
documented. Measures must use easily obtainable data to
ensure that the burde
on the organization does not defeat the purpose of measurement
by absorbing r
be needed elsewhere. Examples of information security activ
monitoring. Other assessment activities (such as the
effectiveness of a training a
program) can also be quantified and used as data sources for
measures.
To be useful in tracking performance and directing resources,
measures need to
performance trends over time and point to improvement actions
that can be app
areas. Management should use measures to re
on risk mitigation factors and
performance and point to appropriate corrective actions.
3.2 Benefits of Using Measures
An information security measurement program provides a
number of org
financial benefits. Major benefits include increasing
accountability for inf
performance; improving effectiveness of information security
activities; demo
compliance with laws, rules and regulations; and providing
quantifiable inputs
allocation decisions.
Increase Accountability: Information security measures can
increase ac
information security by helping to identify specific security
controls that ar
incorrectly, are not implemented, or are ineffective. Data
collection and ana
facilitate identification of the personnel responsible for security
controls imp
specific organizational components or for spe
Improve Information Security Effectiveness: An information
security mea
will enable organizations to quantify improvements in securing
information s
demonstrate quantifiable progress in accomplishing agency
strategic goals and objectives.
10
requirement to state performance measures for past and current
fiscal years. A
information security measures can be used as input into the
Government Acco
(GAO) and Inspectors General (IG) audits. Implementation of
an information s
measurement program will demonstrate agency commitment to
proactive inform
dditionally,
untability Office
ecurity
ation security.
It will also greatly reduce time spent by agencies in collecting
data, which is routinely requested
raints and market
n such an
rity infrastructure.
a comprehensive risk
ased decision
ss. It will allow
ation security
allocation for future
sing the results of the measures analysis, program managers and
system owners
can isolate problems, use collected data to justify investment
requests, and then target
lly to the areas in need of improvement. By using measures to
target
security investments, these measures can aid organizations in
obtaining the best value from
s information security program determines the type of measures
istence and
rogram matures, its
ome more
ta that can be used
for information
ty programs need to
surement. More
the most mature
ine the effect of
An information security program is dependent upon upper-level
management support to define
its goals and objectives. These goals and objectives may be
expressed through information
security policies and processes at the program’s inception, or in
a variety of other sources.
(Goals and objectives are addressed in more detail in Sections
4.1 and 5.2.) Information security
policies are documented, and information security procedures
begin to stabilize, as the program
is implemented and begins to mature. To be useful, information
security measurement requires
existence of documented procedures and some available data on
the implementation of security
controls.
by the GAO and IG during audits and for subsequent status
updates.
Provide Quantifiable Inputs for Resource Allocation Decisions:
Fiscal const
conditions compel government and industry to operate on
reduced budgets. I
environment, it is difficult to justify broad investments in the
information secu
Information security investments should be allocated in
accordance with
management program. Use of information security measures
will support risk-b
making by contributing quantifiable information to the risk
management proce
organizations to measure successes and failures of past and
current inform
investments, and should provide quantifiable data that will
support resource
investments. U
investments specifica
available resources.
3.3 Types of Measures
The maturity of an organization’
that can be gathered successfully. A program’s maturity is
defined by the ex
institutionalization of processes and procedures. As an
information security p
policies become more detailed and better documented, the
processes it uses bec
standardized and repeatable, and the program produces a greater
quantity of da
for performance measurement.
Figure 3-1 depicts this continuum by illustrating measurement
considerations
security programs. As Figure 3-1 illustrates, less mature
information securi
develop their goals and objectives before being able to
implement effective mea
mature programs use implementation measures to evaluate
performance, while
programs use effectiveness/efficiency and business impact
measures to determ
their information security processes and procedures.
11
A mature program normally uses multiple tracking mechanisms
to doc
various aspects of its performance. As more data becomes
available, the d
measurement decreases and the ability to automate data
collection increases.
automatio
Figure 3-1. Information Security Program Maturity and Types
of Mea
ument and quantify
ifficulty of
Data collection
n depends on the availability of data from automated sources
versus the availability of
naires and
ata is available
ols, certification
ered to be fully
automated when all data is gathered by automated data sources
without human involvement or
intervention.
Types of measures (implementation, effectiveness/efficiency,
and impact) that can realistically
be obtained and are useful for performance improvement depend
on the maturity of the security
control implementation. Although different types of measures
can be used simultaneously, the
primary focus of information security measures shifts as
implementation of the information
security program matures. As information security program
goals and strategic plans are
surement
data input by personnel. Manual data collection involves
developing question
conducting interviews and surveys with the organization’s staff.
More usable d
from semi automated and automated data sources—such as self-
assessment to
and accreditation (C&A) databases, and incident
reporting/response databases—as an
information security program matures. Measures data collection
is consid
12
documented and implemented, the ability to reliably collect the
outcome of t
improves. As an organization’s information security program
evolves and perfo
becomes more readily available, measures will focus on
program effectiveness
operational results of security control implementation. Once
information security is integrated
into an organization’s processes, the processes become
repeatable, measu
becomes fully automated, and the mission or business impact of
information security-related
actions
heir implementation
rmance data
/efficiency and the
rement data collection
and events can be determined by analyzing and correlating the
measurement data.
Appendix A contains examples of implementation,
effectiveness/efficiency, and impact
information security
xamples of
ercentage of
ge of information
password policies configured as required. At first, the results of
these measures
t. At this point, the
iency and
he percentage of
ults of this system-level
results reach and
lly implemented
t activities can refocus on other
ter most implementation measures reach and remain at 100
er fully retire
curity controls that
improvement; however, as an organization matures, the
emphasis and resources of
the measurement program should shift away from
implementation and towards
measures.
formation security
program activities.
3.3.2 Effectiveness/Efficiency Measures
Effectiveness/efficiency measures are used to monitor if
program-level processes and system-
level security controls are implemented correctly, operating as
intended, and meeting the desired
outcome. These measures concentrate on the evidence and
results of assessments and may
require multiple data points quantifying the degree to which
information security controls are
measures.
3.3.1 Implementation Measures
Implementation measures are used to demonstrate progress in
implementing
programs, specific security controls, and associated policies and
procedures. E
implementation measures related to information security
programs include the p
information systems with approved system security plans and
the percenta
systems with
might be less than 100 percent. However, as the information
security program and its associated
policies and procedures mature, results should reach and remain
at 100 percen
organization should begin to focus its measurement efforts on
effectiveness/effic
impact measures.
Implementation measures can also examine system-level areas—
for example, t
servers within a system with a standard configuration. At first,
the res
measure will likely be less than 100 percent. When the
implementation measure
remain at 100 percent, it can be concluded that the information
systems have fu
the security controls addressed by this measure, and
measuremen
controls in need of improvement. Af
percent, the organization should begin to focus its measurement
efforts on
effectiveness/efficiency and impact measures. Organizations
should nev
implementation measures because they are effective at pointing
out specific se
are in need of
effectiveness/efficiency and impact
Implementation measures require data that can be easily
obtained from information security
assessment reports, quarterly and annual FISMA reports, plans
of action and milestones
(POA&M), and other commonly used means of documenting and
tracking in
13
implemented and the resulting effect(s) on the organization’s
information secu
example, the percentage of enterprise operating system
vulnerabilities for whic
been applied or that have been otherwise mitigated is both an
implementation
measure. It measures the implementation of the security control
Flaw Remediati
800-53 because the result of the measure demonstrates whether
or not vulne
mitigated through patches or other means. At the same time, the
result
of the Secu
rity posture. For
h patches have
and effectiveness
on (SI-2) in SP
rabilities are
indicates the effectiveness
rity Alerts and Advisories (SI-5) security control because any
result less than the
lly mitigate
mentation
imeliness of the
ure—percentage
idents caused by improperly configured access controls—relies
on
ecurity controls:
AU-6); and Monitoring
omponents that
the efficiency of the
ort (SA-3).
rity decision
sions. These measures can offer
more,
onitoring efforts
ess of security controls. The results of
effectiveness/efficiency measures can be used to ascertain
whether selected security controls are
and are helping facilitate corrective action prioritization.
gram activities
in a manner that can
an organization’s
-specific since each organization has a
mission, impact measures can be used to
quantify:
• Cost savings produced by the information security program or
through costs incurred
from addressing information security events;
• The degree of public trust gained/maintained by the
information security program; or
• Other mission-related impacts of information security.
target indicates a lack of ability to receive alerts and use them
to successfu
vulnerabilities.
Effectiveness/efficiency measures address two aspects of
security control imple
results: the robustness of the result itself, referred to as
effectiveness, and the t
result, referred to as efficiency. For example, the
effectiveness/efficiency meas
of information security inc
information regarding the implementation and effectiveness of
the following s
Incident Monitoring (IR-5); Audit Monitoring, Analysis, and
Reporting (
Configuration Changes (CM-4).
Additionally, the effectiveness/efficiency measure—the
percentage of system c
undergo maintenance on schedule—relies on information
regarding
following security controls: Periodic Maintenance (MA-2) and
Life Cycle Supp
Effectiveness/efficiency measures provide key information for
information secu
makers about the results of previous policy and acquisition deci
insight for improving performance of information security
programs. Further
effectiveness/efficiency measures can be used as a data source
for continuous m
because they help determine the effectiven
functioning properly
Effectiveness/efficiency measures may require fusing
information security pro
data with the data obtained from automated monitoring and
evaluation tools
be directly tied to security controls implementation.
3.3.3 Impact Measures
Impact measures are used to articulate the impact of information
security on
mission. These measures are inherently organization
unique mission. Depending upon the organization’s
14
These measures combine information about the results of
security controls impl
a variety of information about resources. They can provide the
most direct ins
of information security to the organization and are the ones that
are sought out
For example, the percentage of the agency’s information system
budget devote
security relies on information regarding the implementation,
effectiveness,
following NIST SP 800-53 security controls: Allocation of
Resources (SA-2) a
(SA-4). Another, more generalized budget-related impact
measure would b
information security investments reported to OMB in an
ementation with
ight into the value
by executives.
d to information
and outcome of the
nd Acquisitions
e the number of
Exhibit 300. Rather than examining the
between the
ocess.
g a variety of resource information across the organization in a
manner that can be directly tied to information security
activities and events.
Organizations embarking on information security performance
measurement should be aware of
e p make their program a success. These include specific
organizational structure and processes as well as an
understanding of required budget, personnel,
security measures
information security as
ular basis (e.g.,
urce management, legal department) may need to be included in
this process. (See
ore information on stakeholders.) If an organizational element
exists that is
rformance measurement in general, the development and
implementation of an
t organization. If a
pment and
ply with the
the implementing
organization. Results of many information security activities
can be quantified and used for
performance measurement; however, since resources are limited
and the majority of resources
should be applied to correcting performance gaps, organizations
should prioritize measurement
requirements to ensure that a limited number of measures are
gathered. Each stakeholder should
be responsible for as few measures as possible—usually two to
three measures per stakeholder.
This helps ensure that the measures that are collected are
meaningful, yield impact and outcome
findings, and provide stakeholders with the time necessary to
use the results to address
performance gaps. As the program matures and target levels of
measurement are reached,
impact of a security control or controls, this measure evaluates
the relationship
portfolio of information security investments and the budget pr
Impact measures require trackin
3.4 Measurement Considerations
several considerations that can h l
and time resources.
3.4.1 Organizational Considerations
Appropriate stakeholders must be included in the development
of information
and program implementation. Organizational elements that do
not have
their primary responsibility but interact with information
security on a reg
training, reso
Section 5.1 for m
responsible for pe
information security measurement program should be
coordinated with tha
process exists for approving organization-wide data calls and
actions, develo
implementation of the information security measurement
program should com
existing process.
3.4.2 Manageability
Any information security measurement program must be
manageable for
15
obsolete measures should be phased out and new ones that
measure completion
of more current items should be used. New measures will also
be required
and effectiveness
if the organization’s
mission is redefined or if changes are made to information
security policies and guidelines.
repositories used
should be
incident-reporting
lements, or if
f standardizing
s cannot be overemphasized. When organizations are
developing and
ecurity measurement
to facilitate the
ts of
rity measurement
ose of
ation security measures must be as nonintrusive as possible—
and of maximum usefulness
s rather than collect data.
substantial
imize its benefits.
sources to maintain the
program.
Finally, the information contained in information security data
repositories represents a
y of this data,
ected
n
tion. Automating
ps institutionalize
automated data
lections are likely
to be housed in a centralized database or similar data repository.
As a complement to automating performance measurement,
organizations should also consider
how performance measurement automation can supplement
other automated information security
tasks. For example, Extensible Markup Language (XML)-
formatted configuration checklists can
allow organizations to use Commercial Off-The-Shelf (COTS),
Government Off-The-Shelf
(GOTS), or open-source tools to automatically check their
information security configuration
and map it to technical compliance requirements. While these
checklists are primarily used for
3.4.3 Data Management Concerns
To ascertain the quality and validity of data, data collection
methods and data
for measures data collection and reporting, either directly or as
data sources,
standardized. The validity of data is suspect if the primary data
source is an
database that stores only the information reported by a few
organizational e
reporting processes between organizations are inconsistent. The
importance o
reporting processe
implementing processes that may serve as inputs into an
information s
program, they must ensure that data gathering and reporting are
clearly defined
collection of valid data.
Organizations must understand that although they may collect
substantial amoun
information security data, not all data will be useful for their
information secu
program at any given point in time. Any data collection
specifically for the purp
inform
to ensure that available resources are used primarily to correct
problem
Establishment of an information security measurement program
will require a
investment to ensure that the program is implemented in a way
that will max
Benefits of the program are expected to outweigh the costs of
investing re
significant collection of operational and vulnerability data. Due
to the sensitivit
information security performance measurement data repositories
need to be prot
accordingly.
3.4.4 Automation of Measurement Data Collectio
Efficient data management is facilitated by automating
measurement data collec
measurement data collection standardizes data collection and
reporting, and hel
measurement activity by integrating it into business processes.
In addition,
collection minimizes opportunities for human error, leading to
greater accuracy of available data.
Standardized collection and reporting can also increase data
availability, as col
16
compliance with regulations such as FISMA, they can also be
used to map s
control settings to the corresponding NIST SP 800-53 security
controls, which c
verification of compliance more consistent and efficient. For
example, a check
the password strength settings on a system and report whether
or not those sett
requirements specified in NIST SP 800-53. The results of such
automated dat
provide dynamic updates t
pecific technical
an make the
list could examine
ings meet
a collection could
o an agency’s automated information security performance
measures
to indicate if information security targets are being achieved
and where corrective actions and
ety of environments and
perational
ystem development life
ocesses; and
n be applied to organizational units, sites, or other
organizational constructs. Organizations should carefully
define the scope of their information
c goals and
ram maturity.
measurement can be applied at the information system level to
provide
quantifiable data regarding the implementation,
effectiveness/efficiency, or impact of required or
ation system owners can use measures to support the
determination of the information system’s security posture,
demonstrate compliance with
ent. Information security
k assessments,
rting activities, or
3.5.2 System Development Life Cycle
Information security measurement should be used throughout
the SDLC to monitor
implementation of appropriate security controls. Formalized
measurement of information
security during the SDLC provides information to the project
manager that is essential to
understanding how well information security is integrated into
the SDLC and to what degree
vulnerabilities are being introduced into the information system.
Different measures may be
mitigation activities are required.
3.5 Information Security Measurement Program Scope
An information security measurement program can be scoped to
a vari
needs:
• Quantifying information system-level security performance for
an o
information system;
• Quantifying the integration of information security into the s
cycle (SDLC) during information system and software
development pr
• Quantifying enterprise-wide information security performance.
Information security measures ca
security measurement program based on specific stakeholder
needs, strategi
objectives, operating environments, risk priorities, and
information security prog
3.5.1 Individual Information Systems
Information security
desired security controls. Inform
organizational requirements, and identify areas in need of
improvem
measurement can support certification and accreditation
activities (e.g. ris
information system security plans, and continuous monitoring),
FISMA repo
capital planning activities.
17
useful for different project activities. The following table
provides examples of information
security measu ty of project activities.
T ement D ystem Devel nt3
res that can be used during the SDLC for a varie
able 1. Measur uring S opme
SDLC Phase Relevant Measures Purpose Value
Acquisition/Dev
defects that negatively
impact the security
posture of the system
des insight into the
effectiveness of life cycle
es and information
security training for
evelopers
cates need for additional
rity controls in
operations
elopment • Percentage of product • Identify software
defects that may
• Provi
be exploited in the
future
process
d
• Indi
secu
Acquisition/Dev
security requirements
(i.e., security controls
implemented) that are
mapped to design
des insight into
ion of information
rity requirements in
releases
Provides insight into
complexity of information
curity implementation
s short- and long-
for additional
security controls in
operations
elopment • Percentage of information • Determine if
security
• Provi
inclus
requirements are
being planned and
implemented
secu
early
•
se
• Indicate
term need
Acquisition/Dev
ount of
monitoring
required
ides insight into
bility of inherent
vulnerabilities and increased
enterprise risk
elopment • Number of en
for a module
the minimum
try points
(should be
necessary)
• Fewe
poi
am
r entry
nts reduces the
• Prov
possi
Acquisition/Dev discovered
are known as
ilities
overflows
ting)
viations
sign, code,
ents
er of defects and
the area of the code in
which they were found (it
is a higher risk to have
the defects between
or other interfaces)
• Percent of discovered
vulnerabilities that have
been mitigated
• Proactively
address security
defects prior to
testing and
implementation
• Helps minimize
development and
maintenance rework costs
elopment
defects that
software vulnerab
(e.g., buffer
and cross-site scrip
• Number of de
• Number of
between de
and requirem
• Numb
components, unit seams,
3 These measures were developed in collaboration with
Department of Homeland Security Software Assurance Program.
18
SDLC Phase Relevant Measures Purpose Value
Acquisition/Dev
informatio
activities
t into cost
d schedule risks to project
s
es accuracy in
ng of future projects
elopment • Cost/schedule variance in
n security
• Moni
an
tor planning • Provides insigh
d
implementation of
an
succes
security activities • Increas
planni
Implementati
in
erabilities
• Percentage of failed
security control
e
future
t into risk of
being exploited
when implemented
• Indicates need for additional
security controls in
tions
on/Assessment • Percentage of
that conta
vuln
modules • Identify software
defects that may
be exploited in th
• Provides insigh
the system
requirements opera
Collecting and analyzing these types of measures will help the
project manager in the following
ine if software defects that may impact information security are
being identified
more secure design
• Identify and investigate trends that require corrective actions,
such as training or revising
ty controls; and
• Track trends in information security risk throughout the
SDLC.
Collecting, analyzing, and reporting appropriate security
measures during the SDLC can be used
elopment effort to
rather than added
Information security measurement can be implemented on an
enterprise-wide level to monitor
the implementation, effectiveness/efficiency, and impact on the
organization’s information
security activities. Enterprise-level measures may be derived
by aggregating multiple
information system-level measures or developed by using the
entire enterprise as the scope.
For an enterprise-wide measurement to be effective, the
organization must operate at a certain
level of maturity to ensure that processes the measures depend
upon are consistent, repeatable,
and can ensure availability of data across the enterprise.
manner:
• Determ
early in the life cycle where they are more cost-effective to fix;
• Identify and remove potential vulnerabilities in software and
develop
practices;
poorly written and confusing procedures;
• Determine if the information system will comply with required
securi
to improve integration of information security into the
information system dev
increase the overall assurance that system security requirements
are built in
later.
3.5.3 Enterprise-Wide Programs
19
4. LEGISLATIVE AND STRATEGIC DRIVERS
This section explains the relationship between overall agency
performance mea
and information security performance measures reporting, and
provides agen
on how to link these two activities to ensure that their
information secur
to overall accomplishment of the agency mission, goals, and
objectives. Section
provide an overview of the Government Performance Results
Act (GPRA), the
Information Security Management Act (FISMA), and the
Federal Enterprise A
sures reporting
cies with guidelines
ity program contributes
s 4.1 and 4.2
Federal
rchitecture from a
performance measurement point of view and describe their
associated performance management
4.3 discusses the linkage between enterprise strategic planning
and
information security.
ns, is driving an increased
purpose of these
ations, improve efficiencies in
e value of these services to the public. Agencies are
tives and make these plans and corresponding
velops initiatives
4.1.1 Government Performance Results Act
tructure and facilitate
nually
e federal
gencies accountable for achieving
gram performance reform with a series of pilot projects in
setting program
goals, measuring program performance against those goals, and
reporting publicly on
their progress;
• Improve federal program effectiveness and public
accountability by promoting a new
focus on results, service quality, and customer satisfaction;
• Help federal managers improve service delivery by requiring
that they plan for meeting
program objectives, and by providing them with information
about program results and
service quality;
requirements, while Section
4.1 Legislative Considerations
Legislation such as GPRA and FISMA, along with executive
regulatio
emphasis on managing, quantifying, and reporting agency
performance. The
efforts is to facilitate the streamlining of U.S. government oper
delivering services, and demonstrate th
required to strategically plan their initia
performance measures available to the public. The Executive
Branch also de
that may require organizations to collect and report performance
measures.
GPRA focuses on improving program effectiveness and
efficiency by adequately articulating
program goals and providing information on program
performance. To s
program improvement, it requires agencies to develop multiyear
strategic plans and an
report their performance against these plans.
The purpose of GPRA is to:
• Improve the confidence of the American people in the
capability of th
government by systematically holding federal a
program results;
• Initiate pro
20
• Improve congressional decision making by providing more
objec
achieving statutory objectives and by r
tive information on
eporting on the relative effectiveness and
nd
culminates in
A puts this
g and Investment Control (CPIC)
plishes and how well
the accomplishments match with the program’s purpose and
objectives.”5
formance planning processes, agencies should:
anagement and
means to track
e against agency goals and objectives and measurable
performance targets. Agencies
can demonstrate the impact of information security on their
missions by aligning information
mation security goals and objectives.
d Execution of the
Management Act
urate with the
ormation
ementing and
The purpose of FISMA is to:
ness of security controls
over information resources that support federal operations and
assets;
• Recognize the highly networked nature of the current federal
computing environment and
provide effective government wide management and oversight
of related information
efficiency of federal programs and spending; a
• Improve internal management of the federal government.4
GPRA mandates agencies to conduct strategic and performance
planning that
annual submissions of strategic plans and performance measures
reports. GPR
planning in the context of the overall agency Capital Plannin
process by emphasizing “managing for results—what the
program accom
As a part of their annual strategic and per
• Define their long-term and annual goals and objectives;
• Set measurable targets of performance; and
• Report their performance against goals and objectives to the
Office of M
Budget (OMB) on a quarterly basis.
This performance measures reporting directly supports GPRA
by providing a
performanc
security performance measures with their infor
GPRA is implemented by OMB Circular A-11, Preparation,
Submission, an
Budget, Part 6.
4.1.2 Federal Information Security
FISMA requires federal agencies to provide appropriate
protection of their resources through
implementing a comprehensive information security program
that is commens
sensitivity of the information being processed, transmitted, and
stored by agency inf
systems. It also requires agencies to assess and report their
performance in impl
managing their information security programs.
• Provide a comprehensive framework for ensuring the effective
4 Public Law 103-62, Government Performance and Results Act
of 1993.
5 OMB Circular A-11, Preparation, Submission, and Execution
of the Budget, 2005, Section 15, clause 15.5.
21
security risks, including coordination of information security
efforts throughout the
nce of minimum security controls required to
on security
cts offer advanced,
ic security that are
re information
s should be made by individual agencies from among
commercially
developed products.6
nes pertaining to
s and define and
ources. It also requires
rity programs.
enables agencies to
ormation security
stems that
are certified and accredited, the percentage of their personnel
that have taken required
g requirements. A
information security measurement program also enables
agencies to satisfy any new
easures reporting requirements required internally or
r information security data collection, analysis, quantification,
d quarterly FISMA
4.2 Federal Enterprise Architecture
security performance measurement requirements, the
Executive Branch periodically implements initiatives designed
to monitor and improve the
effectiveness of federal organizations. One such Executive
Branch initiative that relies on
information security measures is the Federal Enterprise
Architecture (FEA). One of FEA’s
reference models is the Performance Reference Model (PRM).
The PRM is a standardized
civilian, national security, and law enforcement communities;
• Provide for the development and maintena
protect federal information and information systems;
• Provide a mechanism for improved oversight of federal agency
informati
programs;
• Acknowledge that commercially developed information
security produ
dynamic, robust, and effective information security solutions
for the protection of critical
information infrastructures important to national defense and
econom
designed, built, and operated by the private sector; and
• Recognize that the selection of specific technical hardware
and softwa
security solution
FISMA also mandated NIST to develop and promulgate
standards and guideli
federal information systems.
FISMA requires agencies to identify and assess risks to their
information system
implement appropriate security controls to protect their
information res
agencies to report quarterly and annually on the status of their
information secu
An institutionalized information security performance
measurement program
collect and report on relevant FISMA performance indicators.
For example, inf
performance measures enable agencies to quickly determine the
percentage of their sy
information security training, and their compliance with other
FISMA reportin
mature
information security performance m
externally by providing a basis fo
and reporting.
OMB publishes annual guidelines on the process and elements
of annual an
reporting.
In addition to legislative information
6 Public Law 107-347, E-Government Act of 2002, Title III
22
framework to measure the performance of major IT investments
and their contribution to
implementation into FEA efforts to reduce duplication of data
collection and facilitate integration
rity
gic planning
lly established, each with
lished. As a part of
mplishment of their
measure.
Information security performance measures provide a means to
monitor and report on an
rformance
ctiveness of
ency’s mission.
hich are defined
ecurity must be
d to at least one goal or objective in the strategic planning
process to demonstrate its
ablished by
rity requirements
ishing these goals and
performance
ed at multiple levels within
an organization—including the overall agency information
security program, operating bureau
information security programs, or individual agency programs.
They can also be scoped to
different types of efforts, as discussed in Section 3.6. Measures
developed at different levels of
an organization should be used for internal management and
process improvement purposes.
They may also be aggregated to agency-level information
security program performance
measures. Agency-level measures will either be reported to the
organization’s upper
management or used for external reporting—such as GPRA and
FISMA.
program performance.
Organizations should consider tying information security
measures development and
of information security into their enterprise architectures.
4.3 Linkage Between Enterprise Strategic Planning and
Information Secu
Federal agencies develop their long-term strategic goals as part
of their strate
process—a requirement of GPRA. Five to six strategic goals
are usua
several performance objectives that describe how the goal will
be accomp
this process, agencies develop performance measures to
quantify the acco
goals and objectives with quarterly and annual targets for each
performance
agency’s implementation of its information security program
and associated pe
measures as mandated by FISMA. These measures can also help
assess the effe
security controls in protecting agency information resources in
support of the ag
Ultimately, all efforts must support the agency’s overall goals
and objectives, w
and reassessed annually during its strategic planning activities.
Information s
explicitly tie
importance in accomplishing the agency’s mission. This
connection can be est
identifying goals and objectives that would articulate agency
information secu
within the context of the overall agency mission. Progress
toward accompl
objectives may be monitored by implementing appropriate
information security
measures.
Information security performance measures can be developed
and us
23
5. MEASURES DEVELOPMENT PROCESS
ce measures
n during
early in the process is more effective than
ions for setting up an
• Selecting the measures most appropriate for the organization’s
strategy and business
vironment, and
s;
ation to, all relevant
stakeholders; and
ce, including
the establishment
ent
al set of measures as well as selection of the measures subset
that is
surement program
ects of information
s section describes the
6 describes the information security measurement
n a larger organizational
context and demonstrates that they can be used to progressively
measure the implementation,
ctivities within
r activities:
• Identification and definition of the current information
security program; and
• Development and selection of specific measures to gauge the
implementation,
effectiveness, efficiency, and impact of the security controls.
The activities outlined in Figure 5-1 need not be done
sequentially. The process is provided as a
way to think about measures and facilitate the identification of
measures tailored to a specific
organization and its different stakeholder groups.
The benefit of devoting the time to set up an information
security performan
program in advance is similar to that of allowing time for
requirements definitio
information system development—investing time
retrofitting requirements once the effort is under way.
Important considerat
information security performance measures program include:
environment, including mission and information security
priorities, en
requirement
• Taking time to collect input and get buy-in from, and provide
educ
• Ensuring that appropriate technical and process infrastructure
is in pla
creation/modification of data collection, analysis, and reporting
tools.
Two processes—measures development and measures
implementation—guide
and operation of an information security measurement program.
The measures developm
process establishes the initi
appropriate for an organization at a given time. The
information security mea
implementation process is iterative by nature and ensures that
appropriate asp
security are measured for a specific time period. The remainder
of thi
measures development process. (Section
program implementation process.)
Figure 5-1 illustrates the place of information security measures
withi
effectiveness/efficiency, and business impact of information
security a
organizations or for specific information systems.
The information security measures development process
consists of two majo
24
Figure 5-1. Information Security Measures Development Pr
5.1 Stakeholder Interest Identification
ocess
f the measures development process (see Figure 5-1) identifies
relevant stakeholders
s in information security measurement. Anyone within an
organization can be
me individuals or groups have a greater stake
s. The primary information security stakeholders are:
ystem administrator/network administrator;
• Information system support personnel.
Secondary information security stakeholders are members of
groups within an organization that
do not have information security as their primary mission but
are involved with information
security in some aspects of their operations. Examples of
secondary information security
stakeholders may include:
• Chief Financial Officer (CFO);
Phase 1 o
and their interest
an information security stakeholder, although so
than other
• Agency Head;
• CIO;
• SAISO/CISO;
• ISSO;
• Program manager/information system owner;
• Information s
• Security engineers; and
25
• Training organization;
• Human resources/personnel organization;
ilities.
ts of their particular
ay require an
’s information
be determined through
ent reviews. In
erenced in Section
res. It is
ended that fewer measures per stakeholder be used when an
organization is establishing
uld gradually
ement program
evelopment to
urity performance.
system security
ram’s overall success.
ency/effectiveness,
utive will be
ission impact of information security activities (e.g., What is
the
monetary and public trust cost of the latest incident? Is there an
article about us in a major
and program managers will be interested in the
effectiveness/efficiency of information security programs (e.g.,
Could we have prevented the
work administrators
ps to avoid or
5.2 Goals and Objectives Definition
Phase 2 of the measures development process (see Figure 5-1) is
to identify and document
hat would guide security control
implementation for the information security program of a
specific information system. For
federal information systems, these goals and objectives may be
expressed in the form of high-
level policies and requirements, laws, regulations, guidelines,
and guidance.7
• Inspectors General (IG); and
• Chief Privacy Officer or other designated official with privacy
responsib
Stakeholder interests will differ, depending on the information
security aspec
role and their position within the organizational hierarchy.
Each stakeholder m
additional set of customized measures that provides a view of
the organization
security performance within their area of responsibility.
Interests may
multiple venues, such as interviews, brainstorming sessions, and
mission statem
many cases, stakeholder interests are driven by laws and
regulations. As ref
3.4.2, each stakeholder should initially be responsible for two to
three measu
recomm
an information security program; the number of measures per
stakeholder sho
increase as the information security program and information
security measur
mature.
Stakeholders should be involved in each step of information
security measures d
ensure organizational buy-in to the concept of measuring
information sec
This involvement will also ensure that a sense of ownership of
the information
measures exists at multiple levels of the organization to
encourage the prog
The three measurable aspects of information security—business
impact, effici
and implementation—speak to different stakeholders. For
example, an exec
interested in the business and m
newspaper?), information security
incident? How fast did we respond to it?), and information
systems or net
will want to know what went wrong (e.g., Have we performed
all necessary ste
minimize the impact of the incident?).
information system security performance goals and objectives t
7 See Section 4 for additional information on requirements,
laws, regulations, guidelines, and guidance.
26
Information security program goals and objectives can also be
derived f
goals and objectives in support of the overall organization’s
mission, wh
articulated in agency strategic and performance plans.
Applicable docu
reviewed to identify and extract applicable information security
performance goals and
objecti
rom enterprise-level
ich are usually
ments should be
ves. Extracted goals and objectives should be validated with
the organizational
stakeholders to ensure their acceptance of, and participation in,
the measures development
quirements for
um security
ing to low-
gencies must define
rocessed, stored, and
programs must
entation and
it linkage of
s can use
in FIPS 200, as an input into objectives
ese specifications, which
rovided in Appendix D.
rammatic and
nization-specific
emented are
efine a baseline of
information security practices for the information system.
Specifically, they describe how
niques lead to accomplishing information
security performance goals and objectives. These documents
should be examined not only
ies when the
ents should be
d targets of
performance.
5.4 Information Security Program Implementation Review
In Phase 4 of the measures development process (see Figure 5-
1), any existing measures and data
repositories that can be used to derive measures data should be
reviewed. Following the review,
applicable information should be extracted and used to identify
appropriate implementation
process.
Federal Information Processing Standard (FIPS) 200, Minimum
Security Re
Federal Information and Information Systems, provides
specifications for minim
requirements. NIST SP 800-53 provides minimum security
controls correspond
impact, moderate-impact, and high-impact categories as defined
in FIPS 199, Standards for
Security Categorization of Federal Information and Information
Systems. A
and implement minimum security controls based on the
sensitivity of data p
transmitted on their information systems. As such, agency
information security
include planning, implementing, monitoring, and reporting on
the implem
effectiveness of these information system security controls. To
facilitate explic
information security activities with agency-level strategic
planning, agencie
specifications for minimum security requirements, stated
for developing information security performance measures. (Th
correspond to the 17 security control families in NIST SP 800-
53, are p
Appendix A provides candidate information security measures
from both prog
system-level perspectives, with corresponding goals and
objectives.)
5.3 Information Security Policies, Guidelines, and Procedures
Review
Phase 3 of the measures development process (see Figure 5-1)
focuses on orga
information security practices. Details of how security controls
should be impl
usually set forth in organization-specific policies and
procedures that d
implementing security controls, requirements, and tech
during initial measures development, but in future measures
development activit
initial list of measures is exhausted and needs to be replaced.
Applicable docum
reviewed to identify information security controls, applicable
processes, an
27
evidence to support measures development and data collection.8
Implementat
points to aspects of security controls that would be indicative of
the informatio
performance objective being met, or at least that actions leading
to the accompl
performance objective in the future are performed. The
information system security
ion evidence
n security
ishment of the
requirements, processes, and procedures that have been
implemented can be extracted by
n.
ay contain information from which measures data can be
generated:
;9
est GAO and IG findings;
ed activities, such as incident handling and
it logs, and network and information system
nts and penetration testing results;
curity assessment reports);
results;
• Training results and statistics.
As information system security practices evolve and the
documents that describe them change,
o ensure that the newly
e examined to
Phases 5, 6, and 7 of the measures development process,
depicted in Figure 5-1, involve
developing measures that track process implementation,
efficiency/effectiveness, and mission
ion describes how
to develop measures in these three areas for information
security. (Appendix A provides
to selected security control families in NIST SP
800-53.) To support continuous improvement of security for
information systems and programs,
the process explicitly connects information security activities to
the organization’s strategic goals
consulting multiple sources, including documents, interviews,
and observatio
The following sources m
• System Security Plans
• Plan of Action and Milestones (POA&M) reports;
• Lat
• Tracking of information security-relat
reporting, testing, network management, aud
billing;
• Risk assessme
• C&A documentation (e.g., se
• Continuous monitoring
• Contingency plans;
• Configuration management plans; and
existing measures will be retired and new measures will be
developed. T
developed measures are appropriate, these and similar
documents will need to b
identify new areas that should be captured in measures.
5.5 Measures Development and Selection
impact. The performance ures development process presented
in this sectmeas
candidate measures, some of which correspond
8 Implementation evidence refers to the data collected to
support an information security performance measure.
Implementation
evidence is discussed in greater detail in Table 2 contained in
Section 5.6.
9 NIST SP 800-18 provides guidelines on System Security Plan
development.
28
Organizations manage what
they measure. It is important
to select two to three high-
priority measures per
stakeholder, determined by
using a risk-based approach.
sumes that
ave multiple strategic goals, and that a single goal may require
inputs from
multiple measures.
n security
urity control, a
easures that
help determine where a given organization stands in support of
the corresponding strategic
asured, provide a
rols should:
• Use data describing the security control’s implementation to
generate required measures
th overall information security program performance should:
ity goals and objectives that may encompass performance
of information security across the spectrum of security controls;
and
generate
measures.
tin res, will be quite large.
nsure that the set mentation has the
security
approach. “High priority” may be defined by the
latest GAO or IG reports, results of a risk
assessment, through continuous monitoring, or based
on an internal organizational goal.
• Uses data that can realistically be obtained from
existing sources and data repositories (e.g., system
inventories, training databases, POA&Ms).
through development and use of performance measures. This
approach as
organizations h
5.5.1 Measures Development Approach
Depending on the scope of the measurement effort, development
of informatio
measures should focus on gauging the security performance of a
specific sec
group of security controls, or a security program. Such an
approach will result in m
objective—and, when multiple controls or the entire program
are being me
broad view of information security performance.
Measures corresponding to security control families or
individual security cont
• Be mapped directly to the individual security control(s);
such as POA&M, testing, and project tracking; and
• Characterize the measure as applicable to low, moderate, or
high information system
categorization.
Measures dealing wi
• Be mapped to information secur
• Use the data describing the information security program
performance to
required
5.5.2 Measures Prioritization and Selection
The universe of possible measures, based on exis
Measures must be prioritized to e
g policies and procedu
selected for initial imple
following qualities:
• Facilitates improvement of high-priority
control implementation as defined using a risk-based
29
• Measures processes that already exist and are established.
Measuring i
processes will not provide meaningful data about information
security p
will not be useful for targeting specific aspects of performance.
Howeve
such measurement may still be useful to attain a baseline to be
closely m
nconsistent
erformance and
r, attempting
onitored through
continuous assessment and further measurement to improve the
information security
ce of selected
y program
portance in the
Weight should be based on the overall risk
mitigation goals and would likely reflect higher criticality of
enterprise-level initiatives versus
is a useful tool that facilitates the integration of information
security measures into the departmental capital planning
process.
ation security
ch success is measured. The
rformance
easures
implementation
is complex because
te
f performance for
ation of security
events on its
An organization
nd should be ready to adjust
these targets, based on actual measurements, once they are
obtained. The organization may also
decide not to set targets for these measures until the first
measurement is collected that can be
used as a performance baseline. Once the baseline is obtained
and corrective actions identified,
appropriate measurement targets and implementation milestones
that are realistic for a specific
system environment can be defined. If performance targets
cannot be established after the
baseline has been obtained, management should evaluate
whether the measured activities and
corresponding measures are providing the expected value for the
organization.
posture.
Organizations may decide to use a weighting scale to
differentiate the importan
measures and ensure that results accurately reflect existing
information securit
priorities. This would involve assigning values to each measure
based on its im
context of the overall information security program.
smaller-scale initiatives. This scale
5.5.3 Establishing Performance Targets
Establishing performance targets is an important component of
defining inform
measures. Performance targets establish a benchmark by whi
degree of success is based on the proximity of the measure
result to the stated pe
target. The mechanics of establishing performance targets
differ for implementation m
and the other two types of measures (effectiveness/efficiency
and impact). For
measures, targets are set to 100 percent completion of specific
tasks.
Setting performance targets for effectiveness/efficiency and
impact measures
management will need to apply qualitative and subjective
reasoning to determine appropria
levels of security effectiveness and efficiency, and use these
levels as targets o
applicable measures. Although every organization desires
effective implement
controls, efficient delivery of security services, and minimal
impact of security
mission, the associated measurements will be different for
different systems.
can attempt to establish performance targets for these measures
a
30
This template and the
candidate measures
provided in Appendix
A are examples, and
are meant to be
tailored to fit the
needs of the
organization.
gets of
vailable. Trends
existed previously,
ommendations
ndustry, when published, may provide a means of setting
targets.
Figure 5-2 provides an example of an implementation measure
that is based on the percentage of
approved system security plans.
Establishment of effectiveness/efficiency and impact measures
baselines and tar
performance can be facilitated if historic data that pertains to
these measures is a
observed in the past will provide insight into ranges of
performance that have
and guide the creation of realistic targets for the future. In the
future, expert rec
and standards within the i
Percentage of Approved System Security Plans
0%
20%
40%
60%
80%
100%
Oct-05 Apr-06 Oct-06 Apr-07 Oct-07
asu le
easure
evelop
ndard fo
n, analysis, and
e, provided in Table 2, is
an example of such a format.
While the measures template provides a suggested approach for
measurement, depending upon internal practices and procedures,
organizations may tailor their own performance measurement
templates by using a subset of the provided fields or adding
more
fields based on their environment and requirements.
Figure 5-2. Information Security Me
5.6 Measures Development Template
res Trend Examp
s in a
ment,
rmat will
Organizations should document their performance m
standard format to ensure repeatability of measures d
tailoring, collection, and reporting activities. A sta
provide the detail required to guide measures collectio
reporting activities. The measures templat
31
Table 2. Measures Template and Instructions
Field Data
Measure ID que identifier used for measure tracking and
sorting. The unique identifier
ly reference another
State the uni
can be from an organization-specific naming convention or can
direct
source.
Goal stem-level security
ntation for that
s and information
als can be derived
hese goals are
possible, include both the
al extracted from agency
at would contribute to
Statement of strategic goal and/or information security goal. For
sy
control measures, the goal would guide security control
impleme
information system. For program-level measures, both strategic
goal
security goals can be included. For example, information
security go
from enterprise-level goals in support of the organization’s
mission. T
usually articulated in strategic and performance plans. When
enterprise-level goal and the specific information security go
documentation, or identify an information security program goal
th
the accomplishment of the selected strategic goal.
Measure h the word
ber,” “frequency,” “average,” or a similar term.
red. Security
tion Evidence. If the
erate, or low), state
Statement of measurement. Use a numeric statement that begins
wit
“percentage,” “num
If applicable, list the NIST SP 800-53 security control(s) being
measu
controls that provide supporting data should be stated in
Implementa
measure is applicable to a specific FIPS 199 impact level (high,
mod
this level within the measure.
Type ess/efficiency, or impact. Statement of whether the
measure is implementation, effectiven
Formula a measure. The
ves as an input into the
Calculation to be performed that results in a numeric expression
of
information gathered through listing implementation evidence
ser
formula for calculating the measure.
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx
Performance MNIST Special Publicatio.docx

More Related Content

Similar to Performance MNIST Special Publicatio.docx

Guide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docxGuide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docx
whittemorelucilla
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detection
Marc Manthey
 
NIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docxNIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docx
vannagoforth
 
NIST Special Publication 800-34 Rev. 1 Contingency.docx
NIST Special Publication 800-34 Rev. 1   Contingency.docxNIST Special Publication 800-34 Rev. 1   Contingency.docx
NIST Special Publication 800-34 Rev. 1 Contingency.docx
picklesvalery
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
maxinesmith73660
 
Guidelines on Securing Public Web Servers
Guidelines on Securing Public Web ServersGuidelines on Securing Public Web Servers
Guidelines on Securing Public Web Servers
webhostingguy
 
1. Do you think that variable costing is useful for controlling co.docx
1. Do you think that variable costing is useful for controlling co.docx1. Do you think that variable costing is useful for controlling co.docx
1. Do you think that variable costing is useful for controlling co.docx
ambersalomon88660
 

Similar to Performance MNIST Special Publicatio.docx (20)

Guide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docxGuide for Security-Focused Configuration Management of I.docx
Guide for Security-Focused Configuration Management of I.docx
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detection
 
Sp800 30-rev1-ipd
Sp800 30-rev1-ipdSp800 30-rev1-ipd
Sp800 30-rev1-ipd
 
NIST - определения для Интернета вещей
NIST - определения для Интернета вещейNIST - определения для Интернета вещей
NIST - определения для Интернета вещей
 
NIST Server Hardening Guide SP 800-123
NIST Server Hardening Guide  SP 800-123 NIST Server Hardening Guide  SP 800-123
NIST Server Hardening Guide SP 800-123
 
NIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docxNIST Special Publication 800-39 Managi.docx
NIST Special Publication 800-39 Managi.docx
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
 
NIST SP 800-83 Malware Prevention
NIST SP 800-83 Malware PreventionNIST SP 800-83 Malware Prevention
NIST SP 800-83 Malware Prevention
 
Nist.sp.800 53r4 (1)
Nist.sp.800 53r4 (1)Nist.sp.800 53r4 (1)
Nist.sp.800 53r4 (1)
 
Implementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy OfficerImplementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy Officer
 
NIST Special Publication 800-34 Rev. 1 Contingency.docx
NIST Special Publication 800-34 Rev. 1   Contingency.docxNIST Special Publication 800-34 Rev. 1   Contingency.docx
NIST Special Publication 800-34 Rev. 1 Contingency.docx
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Nistspecialpublication800 40ver2
Nistspecialpublication800 40ver2Nistspecialpublication800 40ver2
Nistspecialpublication800 40ver2
 
«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...«Руководство по безопасности и защите персональных данных при использовании п...
«Руководство по безопасности и защите персональных данных при использовании п...
 
nistspecialpublication800-86.pdf
nistspecialpublication800-86.pdfnistspecialpublication800-86.pdf
nistspecialpublication800-86.pdf
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
 
NIST.SP.800-53r4
NIST.SP.800-53r4NIST.SP.800-53r4
NIST.SP.800-53r4
 
Guidelines on Securing Public Web Servers
Guidelines on Securing Public Web ServersGuidelines on Securing Public Web Servers
Guidelines on Securing Public Web Servers
 
1. Do you think that variable costing is useful for controlling co.docx
1. Do you think that variable costing is useful for controlling co.docx1. Do you think that variable costing is useful for controlling co.docx
1. Do you think that variable costing is useful for controlling co.docx
 
Guidelines on Security and Privacy in Public Cloud Computing
Guidelines on Security and Privacy in Public Cloud ComputingGuidelines on Security and Privacy in Public Cloud Computing
Guidelines on Security and Privacy in Public Cloud Computing
 

More from karlhennesey

More from karlhennesey (20)

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docx
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docx
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docx
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docx
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docx
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docx
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docx
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docx
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docx
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docx
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docx
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Performance MNIST Special Publicatio.docx

  • 1. Performance MNIST Special Publication 800-55 Revision 1 easurement Guide for Information Security Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, and Will Robinson I N F O R M A T I O N S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 July 2008
  • 2. U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James M. Turner, Deputy Director Reports on Computer Systems Technology nd Technology ship for the Nation’s ce data, proof of ductive use of strative, s for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This Special Publication 800-series reports on ITL’s research, guidelines, and outreach efforts in information security, and its collaborative activities with industry, government, and academic organizations.
  • 3. The Information Technology Laboratory (ITL) at the National Institute of Standards a (NIST) promotes the U.S. economy and public welfare by providing technical leader measurement and standards infrastructure. ITL develops tests, test methods, referen concept implementations, and technical analyses to advance the development and pro information technology. ITL’s responsibilities include the development of management, admini technical, and physical standards and guideline ii Authority This document has been developed by the National Institute of Standards and Technology (NIST) in nagement Act rements, and for t such standards and security systems. This guideline is consistent with the requirements ency s. Supplemental
  • 4. vided in A-130, Appendix III. y nongovernmental tion would be Nothing in this document should be taken to contradict standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. furtherance of its statutory responsibilities under the Federal Information Security Ma (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requi providing adequate information security for all agency operations and assets, bu guidelines shall not apply to national of the Office of Management and Budget (OMB) Circular A- 130, Section 8b(3), Securing Ag Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Section information is pro This guideline has been prepared for use by federal agencies. It
  • 5. may also be used b organizations on a voluntary basis and is not subject to copyright regulations. (Attribu appreciated by NIST.) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the en materials, or equipment are necessarily the best available for the purpose. tities, iii Acknowledgements zabeth Lennon (NIST), ) who reviewed gratefully ciate the many contributions from individuals and organizations in the public and private sectors whose thoughtful and constructive comments improved the quality and usefulness of this publication.
  • 6. The authors wish to thank Joan Hash (NIST), Arnold Johnson (NIST), Eli Karen Scarfone (NIST), Kelley Dempsey (NIST), and Karen Quigg (MITRE drafts of this document and/or contributed to its development. The authors also acknowledge and appre iv T A B L E O F C O N T E N T S E ................... VIII ................... ......1 .................. .....1 .................. .....2 .................. .....2 ..........................4 .....................5 R .................. .....6 ................... ......6 ................... ......6 .................. .....7 ................... ......8 ................... ......8
  • 7. ................... ......8 3. .................. .....9 .................. .....9 .................. ...10 .................. ...11 .................. ...13 .................. ...13 .................. ...14 .................. ...15 .................. ...15 ................... ....16 ................... ....16 .................. ...17 .................. ...17 3 .................. ...17 .................. ...19 L ................... ....20 4.1 Legislative Considerations......................................................................... ....................20 4.1.1 Government Performance Results Act.......................................................................20 4.1.2 Federal Information Security Management Act ........................................................21 4.2 Federal Enterprise Architecture .....................................................................................22 4.3 Linkage Between Enterprise Strategic Planning and
  • 8. Information Security ..................23 5. MEASURES DEVELOPMENT PROCESS......................................................................24 5.1 Stakeholder Interest Identification .................................................................................25 XECUTIVE SUMMARY .............................................................................. . ... .. .. .. .. .. .. .. .. 2.4 Program Manager/Information System Owner...................................... . .... .... .... ....
  • 9. .... .... .... .... .... .... .... .... .... .... .... .... .... .... 1. INTRODUCTION.................................................................... ................. . . 1.1 Purpose and Scope .............................................................................. . ... 1.2 Audience ............................................................................................. .
  • 10. ... ... 1.3 History.................................................................................... ............. . 1.4 Critical Success Factors ............................................................................................... ....3 1.5 Relationship to Other NIST Documents ................................................ 1.6 Document Organization .............................................................................. 2. OLES AND RESPONSIBILITIES....................................................... . ... 2.1 Agency Head....................................................................................... . . 2.2 Chief Information Officer .................................................................. . . 2.3 Senior Agency Information Security Officer...................................... . ... 2.5 Information System Security Officer................................................ . . 2.6 Other Related Roles .......................................................................... . . INFORMATION SECURITY MEASURES BACKGROUND.......... . ... 3.1 Definition ............................................................................... ........... . ... 3.2 Benefits of Using Measures .............................................................. .
  • 11. ... ... 3.3 Types of Measures ............................................................................ . ...3.3.1 Implementation Measures ............................................................. . ...3.3.2 Effectiveness/Efficiency Measures ............................................... . ...3 ... .3.3 Impact Measures ........................................................................... . ...3.4 Measurement Considerations............................................................ . 3.4.1 Organizational Considerations...................................................... . . 3.4.2 Manageability ............................................................................................... .............15 3.4.3 Data Management Concerns ......................................................... . 3.4.4 Automation of Measurement Data Collection .............................. . . 3.5 Information Security Measurement Program Scope......................... .
  • 12. 3 ... ... .5.1 Individual Information Systems.................................................... . ....5.2 System Development Life Cycle .................................................. . ...3.5.3 Enterprise-Wide Programs............................................................ . .4. EGISLATIVE AND STRATEGIC DRIVERS .................................. . v 5.2 Goals and Objectives Definition ....................................................... . ....... .... .... .... .... .... .... .... .... IO .... .... ...... .....
  • 13. ...... .................. ...26 .................. ...27 .................. ...27 .................. ...28 .................. ...29 5 .................. ...29 5 ................... ....30 ................... ....31 .................. ...33 I N ....................35 .................. ...35 .................. ...36 .................. .38 .................. .38 ................... APPENDIX B: ACRONYMS ............................................................................................... ....B-1 APPENDIX C: REFERENCES......................................................................... ...................... C-1 APPENDIX D: SPECIFICATIONS FOR MINIMUM SECURITY
  • 14. REQUIREMENTS . D-1 5.3 Information Security Policies, Guidelines, and Procedures Review . ... 5.4 Information Security Program Implementation Review................... . ... ... 5.5 Measures Development and Selection .............................................. . ...5.5.1 Measures Development Approach ................................................ . ....5.2 Measures Prioritization and Selection .......................................... . ..5.3 Establishing Performance Targets ................................................ . 5.6 Measures Development Template..................................................... . . 5.7 Feedback Within the Measures Development Process ..................... . ... 6. NFORMATION SECURITY MEASUREMENT IMPLEMENTAT 6.1 Prepare for Data Collection .............................................................. . ... 6.2 Collect Data and Analyze Results..................................................... . ... 6.3 Identify Corrective Actions............................................................. . ..... 6.4 Develop Business Case and Obtain Resources
  • 15. ................................ . ..... 6.5 Apply Corrective Actions .............................................................................................. 40 APPENDIX A: CANDIDATE MEASURES .............................................. . .. A-1 vi L I S T O F F I G U R E S .................. .....3 ................... ....25 Figure 5-2. Information Security Measures Trend Example .........................................................31 Figure 6-1. Information Security Measurement Program Implementation Process ......................35 Table 1. Measurement During System Development ....................................................................18 Table 2. Measures Template and Instructions ...............................................................................32 Figure 1-1. Information Security Measurement Program Structure ................. ..... nt .... ... Figure 3-1. Information Security Program Maturity and Types of Measureme .........................12
  • 16. Figure 5-1. Information Security Measures Development Process .................. . . L I S T O F T A B L E S vii EXECUTIVE SUMMARY entation of measures ate the upporting information prove performance, levant cy, and ’s success in rocess described in this guide tionship between agency mission, n Act, the k Elimination Act t (FISMA)—cite information nce measurement in tion to legislative compliance, agencies can use performance measures as management tools in their internal improvement efforts and link implementation of
  • 17. ts. ent and implementation of an d numbers); information security processes should be considered for measurement; d directing resources. easures are This document focuses on the development and collection of three types of measures: • Implementation measures to measure execution of security policy; • Effectiveness/efficiency measures to measure results of security services delivery; and • Impact measures to measure business or mission consequences of security events. This document is a guide to assist in the development, selection, and implem to be used at the information system and program levels. These measures indic effectiveness of security controls applied to information systems and s security programs. Such measures are used to facilitate decision making, im and increase accountability through the collection, analysis, and reporting of re
  • 18. performance-related data—providing a way to tie the implementation, efficien effectiveness of information system and program security controls to an agency achieving its mission. The performance measures development p will assist agency information security practitioners in establishing a rela information system and program security activities under their purview and the helping to demonstrate the value of information security to their organization. A number of existing laws, rules, and regulations—including the Clinger-Cohe Government Performance and Results Act (GPRA), the Government Paperwor (GPEA), and the Federal Information Security Management Ac performance measurement in general, and information security performa particular, as a requirement. In addi their information security programs to agency-level strategic planning effor The following factors must be considered during developm information security measurement program: • Measures must yield quantifiable information (percentages, averages, an • Data that supports the measures needs to be readily obtainable; • Only repeatable and
  • 19. • Measures must be useful for tracking performance an The measures development process described in this document ensures that m developed with the purpose of identifying causes of poor performance and pointing to appropriate corrective actions. viii ix ful for ent types of ary focus of information security measures shifts as the implementation of security controls matures. The types of measures that can realistically be obtained, and that can also be use performance improvement, depend on the maturity of the agency’s information security program and the information system’s security control implementation. Although differ measures can be used simultaneously, the prim 1. INTRODUCTION gulatory, financial,
  • 20. ions cite information ent in e Clinger-Cohen Act, the Government mination Act (GPEA), and tion security rformance sures as on of their rmation security and accountability ata. They provide ty controls to an in its mission-critical activities. The performance measures development is document will assist agency information security practitioners in ship between information system and program security activities under f information security plementation of elated activities. It entifies the adequacy h to help es, identify and ontrols for continuous
  • 21. cesses and how nd support risk- program can and should entation of such a program assists agencies in meeting the annual requirements of the Office of Management and Budget (OMB) to report the status of agency information security programs. NIST Special Publication (SP) 800-55, Revision 1, expands upon NIST’s previous work in the field of information security measures to provide additional program-level guidelines for quantifying information security performance in support of organizational strategic goals. The processes and methodologies described in this document link information system security performance to agency performance by leveraging agency-level strategic planning processes. By doing so, the processes and methodologies help demonstrate how information security The requirement to measure information security performance is driven by re and organizational reasons. A number of existing laws, rules, and regulat performance measurement in general, and information security performance measurem particular, as a requirement. These laws include th Performance and Results Act (GPRA), the Government Paperwork Eli the Federal Information Security Management Act (FISMA).
  • 22. While these laws, rules, and regulations are important drivers for informa measurement, equally compelling are the benefits that information security pe measurement can yield for organizations. Agencies can use performance mea management tools in their internal improvement efforts and link implementati information security programs to agency-level strategic planning efforts. Info measures are used to facilitate decision making and improve performance through collection, analysis, and reporting of relevant performance-related d the means for tying the implementation, efficiency, and effectiveness of securi agency’s success process described in th establishing a relation their purview and the agency mission, helping to demonstrate the value o to their organization. 1.1 Purpose and Scope This document is a guide for the specific development, selection, and im information system-level and program-level measures to indicate the implementation, efficiency/effectiveness, and impact of security controls, and other security-r provides guidelines on how an organization, through the use of measures, id of in-place security controls, policies, and procedures. It provides an approac management decide where to invest in additional information
  • 23. security resourc evaluate nonproductive security controls, and prioritize security c monitoring. It explains the measurement development and implementation pro measures can be used to adequately justify information security investments a based decisions. The results of an effective information security measurement provide useful data for directing the allocation of information security resources simplify the preparation of performance-related reports. Successful implem 1 contributes to accomplishing agency strategic goals and objectives. Performance m developed according to this guide will enhance the a easures bility of agencies to respond to a variety of mended Security at support the s on developing r, expand, or use ile focused on NIST SP 800-53 security controls, measures related to an be helpful in ta collection, analysis,
  • 24. ored to support FISMA performance measures, e Architecture’s (FEA) Performance Reference Model (PRM) requirements, and any other enterprise-specific requirements for reporting quantifiable information about written primarily for Chief Information Officers (CIOs), Senior Agency Information Security Officers (SAISOs)—often referred to as Chief Information Security SOs)—and Information System Security Officers (ISSOs). It targets individuals who are familiar with security controls as described in NIST SP 800-53. The concepts, vernment and ness has been under development for , and tion Security, both e publications by building upon them to align this approach with security controls provided in NIST SP 800-53, Recommended Security Controls for Federal Information Systems. The document also expands 0-55 to assist with the assessment of information security program implementation. Security control implementation for information systems and information security programs is
  • 25. reviewed and reported annually to OMB in accordance with the Electronic Government Act of 2002, which includes FISMA. The Act requires departments and agencies to demonstrate that federal government mandates and initiatives, including FISMA. This publication uses the security controls identified in NIST SP 800-53, Recom Controls for Federal Information Systems, as a basis for developing measures th evaluation of information security programs. In addition to providing guideline measures, the guide lists a number of candidate measures that agencies can tailo as models for developing other measures.1 Wh the process described in this guide can be applied to develop agency-specific security controls that are not included in NIST SP 800-53. The information security measurement program described in this document c fulfilling regulatory requirements. The program provides an underlying da and reporting infrastructure that can be tail Federal Enterpris information security performance. 1.2 Audience This guide is Officers (CI
  • 26. processes, and candidate measures presented in this guide can be used within go industry contexts. 1.3 History The approach for measuring security control effective several years. NIST SP 800-55, Security Metrics Guide for Information Technology Systems NIST Draft SP 800-80, Guide to Developing Performance Metrics for Informa addressed information security measurement. This document supersedes thes on concepts and processes introduced in the original version of NIST SP 80 1 Candidate measures offered by this guide do not constitute mandatory requirements. Rather, they provide a sampling of measures to be considered for use by the readers of this guide. 2 they are meeting applicable information security requirements, and to document the level of performance based on results of annual program reviews. An information security measurement program within an organization should include four interdependent components (see Figure 1-1). 1.4 Critical Success Factors
  • 27. Figure 1-1. Information Security Measurement Program Structure This support ization. Without trol information ured by The second component of an effective information security measurement program is the existence of information security policies and procedures backed by the authority necessary to enforce compliance. Information security policies delineate the information security management structure, clearly assign information security responsibilities, and lay the foundation needed to reliably measure progress and compliance. Procedures document management’s position on the implementation of an information security control and the rigor with which it is applied. Measures are not easily obtainable if no procedures are in place that supply data to be used for measurement. The foundation of strong upper-level management support is critical, not only for the success of the information security program, but also for the program’s implementation. establishes a focus on information security within the highest levels of the organ a solid foundation (i.e., proactive support of personnel in positions that con resources), the information security measurement program can
  • 28. fail when press organizational dynamics and budget limitations. 3 The third component is developing and establishing quantifiable performanc designed to capture and provide meaningful performance data. To provide meaningful data, quantifiable information security measures must be based on information goals and objectives, and be easily obtainable and feasible to measure. They m e measures that are security performance ust also be repeatable, provide relevant performance trends over time, and be useful for tracking onsistent periodic learned, improve d plan for the implementation of future security controls to meet new information security requirements as they occur. Accurate data collection ningful and useful d by the degree rmation security measurement
  • 29. program should provide substantive justification for decisions that directly affect the information se decisions include budget and personnel requests and should assist in ance. ded to assist ent, s on quantifying fforts such as those described in NIST SP ation Systems; in NIST SP 800-30, mmended Security from NIST SP 800-53A in that it provides a quantitative approach to measuring and analyzing security controls implementation and effectiveness at the information system and program levels, aggregated across multiple individual efforts. It also provides an approach for aggregating information from multiple information systems to measure and analyze information security from an enterprise-level perspective. NIST SP 800-53A provides procedures for assessing if the security controls are implemented and operating as intended according to the information system security plan for the system. The assessment data produced as a result of applying NIST SP 800-53A assessment procedures can serve as a data source for information security measurement.
  • 30. performance and directing resources. Finally, the information security measurement program itself must emphasize c analysis of the measures data. Results of this analysis are used to apply lessons effectiveness of existing security controls, an must be a priority with stakeholders and users if the collected data is to be mea in improving the overall information security program. The success of an information security program implementation should be judge to which meaningful results are produced. A comprehensive info security posture of an organization. The allocation of available resources. An information security measurement program the preparation of required reports relating to information security perform 1.5 Relationship to Other NIST Documents This document is a continuation in a series of NIST special publications inten information management and information security personnel in the establishm implementation, and maintenance of an information security program. It focuse information security performance based on the results of a variety of information security activities. This approach draws upon many sources of data, including:
  • 31. • Information security assessment and testing e 800-53A, Guide for Assessing the Security Controls in Federal Inform • Information security risk assessments efforts, such as those described Risk Management Guide for Information Technology Systems; and • Minimum security controls recommended in NIST SP 800-53, Reco Controls for Federal Information Systems. NIST SP 800-55, Revision 1, differs 4 5 inputs into the anagers; and • NIST SP 800-65, Integrating IT Security into the Capital Planning and Investment sist with prioritization for the continuous monitoring of bed in NIST SP 800-37, Guide for the Security Certification and 1.6 Document Organization nsibilities of agency rity program, and in
  • 32. uidelines on the security measures, the benefits of he factors that . y to strategic rocess used for usses those factors tion of an information security measurement program. This guide contains four appendices. Appendix A, Candidate Measures, provides practical examples of information security measures that can be used or modified to meet specific agency requirements. Appendix B provides a list of acronyms used in this document. Appendix C lists references. Appendix D lists specifications for minimum security requirements taken from Federal Information Processing Standard (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems. Information security measurement results described in this guide will provide information security program activities described in a number of NIST publications, including: • NIST SP 800-100, Information Security Handbook: A Guide for M Control Process.
  • 33. These measures can also be used to as security controls, as descri Accreditation of Federal Information Systems. The remaining sections of this guide discuss the following: • Section 2, Roles and Responsibilities, describes the roles and respo staff that have a direct interest in the success of the information secu the establishment of an information security measurement program. • Section 3, Information Security Measures Background, provides g background and definition of information implementation, various types of information security measures, and t directly affect success of an information security measurement program • Section 4, Legislative and Strategic Drivers, links information securit planning through relevant legislation and guidelines. • Section 5, Measures Development Process, presents the approach and p development of information security measures. • Section 6, Information Security Measurement Implementation, disc that can affect the implementa
  • 34. 2. ROLES AND RESPONSIBILITIES This section outlines the key roles and responsibilities for developing and imp information security measures. While information security is the responsib of the organization lementing ility of all members , the positions described in Sections 2.1 through 2.6 are key information ders that should work to instill a culture of information security awareness zation.. urement are as agency strategic and al planning processes to secure the organization’s mission; to annual reporting on the ation ent and gency; t activities have adequate financial and human resources for success; • Actively promoting information security measurement as an essential facilitator of y; and
  • 35. • Approving policy to officially institute measures collection. 2 ollowing responsibilities related to information • Using information security measures to assist in monitoring compliance with applicable information security requirements; • Using information security measures in annually reporting on effectiveness of the agency • Demonstrating management’s commitment to information security measures development and implementation through formal leadership; security stakehol across the organi 2.1 Agency Head The specific Agency Head responsibilities related to information security meas follows: • Ensuring that information security measures are used in support of operation • Ensuring that information security measures are integrated in effectiveness of the agency information security program by the Chief Inform Officer (CIO);
  • 36. • Demonstrating support for information security measures developm implementation, and communicating official support to the a • Ensuring that information security measuremen information security performance improvement throughout the agenc 2.2 Chief Information Officer The Chief Information Officer (CIO) has the f security measurement: information security program to the agency head; 2 When an agency has not designated a formal Chief Information Officer position, FISMA requires the associated responsibilities to be handled by a comparable agency official. 6 • Formally communicating the importance of using information secu monitor the over rity measures to all health of the information security program and to comply with ent and implementation;
  • 37. ion security ation security ures data to support policy, resource allocation, budget decisions, and assessment of information measures analysis king corrective actions such as revising information security procedures and urity training to staff; and • ment, and institute Officer (SAISO) may thin this he CISO. The SAISO has : lanning, , evaluating, and documenting remedial actions to address any deficiencies ency; ation security information O’s annual reporting to ency head on the effectiveness of the agency’s information security program,
  • 38. including progress of remedial actions; • Conducting information security measures development and implementation; • Ensuring that a standard process is used throughout the agency for information security measures development, creation, analysis, and reporting; and, • Using information security measures for policy, resource allocation, and budget decisions. applicable regulations; • Ensuring information security measurement program developm • Allocating adequate financial and human resources to the informat measurement program; • Reviewing information security measures regularly and using inform meas the information security program posture and operational risks to agency systems; • Ensuring that a process is in place to address issues discovered through and ta providing additional information sec Issuing policy, procedures, and guidelines to officially develop, imple
  • 39. measures. 2.3 Senior Agency Information Security Officer Depending upon the agency, the Senior Agency Information Security sometimes be referred to as the Chief Information Security Officer (CISO). Wi document, the term SAISO is used to represent both the SAISO and t the following responsibilities related to information security measurement • Integrating information security measurement into the process for p implementing in the information security policies, procedures, and practices of the ag • Obtaining adequate financial and human resources to support inform measurement program development and implementation; • Leading the development of any internal guidelines or policy related to security measures; • Using information security measures in support of the agency CI the ag 7 8
  • 40. 2.4 Program Manager/Information System Owner ensuring that nd availability of information and information systems. The program manager/information system owner has the t: rity measurement program development and ction and • Educating staff on the development, collection, analysis, and reporting of information quirements, • Ensuring that measurement data is collected consistently and accurately and is provided red; • Reviewing information security measures data regularly and using it for policy, resource s; and easuring performance. t: information security measurement program development and collection and ata or providing measurement data to designated staff that are collecting,
  • 41. analyzing, and reporting the data. 2.6 Other Related Roles Information security measurement may require inputs from a variety of organizational components or stakeholders, including incident response, information technology operations, privacy, enterprise architecture, human resources, physical security, and others. Section 5.1 lists additional stakeholders. Program managers, as well as information system owners, are responsible for proper security controls are in place to address the confidentiality, integrity, a following responsibilities related to information security measuremen • Participating in information secu implementation by providing feedback on the feasibility of data colle identifying data sources and repositories; security measures and how it will affect information security policy, re resource allocation, and budget decisions; to designated staff who are analyzing and reporting the data; • Directing full participation and cooperation of staff, when requi allocation, and budget decision
  • 42. • Supporting implementation of corrective actions, identified through m information security 2.5 Information System Security Officer The Information System Security Officer (ISSO) has the following responsibilities related to information security measuremen • Participating in implementation by providing feedback on the feasibility of data identifying data sources and repositories; and • Collecting d 3. INFORMATION SECURITY MEASURES BACKGROUND s are and why defines types can be used; discusses the key aspects of making an information security measurement program successful; and identifies the uses of measures for management, reporting, aking. prove performance tability through the collection, analysis, and reporting of relevant performance-related easured activities and
  • 43. n observed nization. progressively higher levels, depending on the size and complexity of an organization. While a ms, such as he results of data goals and n information or uate information ance objectives enable n security policies and organization. example goal training includes f, and a reference tion’s information security policies and procedures. tives by ols; analyzing the adequacy of information security program activities; and identifying possible improvement actions. During measures development, goals and objectives from federal guidelines, legislation, regulations, and enterprise-level guidance are identified and prioritized to ensure that the measurable aspects of information security performance correspond to the operational priorities of the organization.
  • 44. Information security measures must yield quantifiable information for comparison purposes, apply formulas for analysis, and track changes using the same points of reference. Percentages This section provides basic information on what information security measure information security performance should be measured. Additionally, this section of measures that and decision m 3.1 Definition Information security measures are used to facilitate decision making and im and accoun data. The purpose of measuring performance is to monitor the status of m facilitate improvement in those activities by applying corrective actions based o measurements. Information security measures can be obtained at different levels within an orga Detailed measures, collected at the information system level, can be aggregated and rolled up to case can be made for using different terms for more detailed and aggregated ite “metrics” and “measures,” this document standardizes on “measures” to mean t collection, analysis, and reporting. This document refers to the process of data collection, analysis, and reporting as “measurement.”
  • 45. Information security measures are based on information security performance objectives. Information security performance goals state the desired results of a security program implementation, such as, “All employees should receive adeq security awareness training.” Information security perform accomplishment of goals by identifying practices defined by informatio procedures that direct consistent implementation of security controls across the Examples of information security performance objectives, corresponding to the cited above, are: All new employees receive new employee training. Employee a summary of the Rules of Behavior. Employee training includes a summary o to, the organiza Information security measures monitor the accomplishment of goals and objec quantifying the implementation, efficiency, and effectiveness of security contr 9 or averages are most common. Absolute numbers are sometimes useful, depending on the ss that is under d repeatable table and stable,
  • 46. e have not been n of measurement esources that may ities that can provide data for measurement include risk assessments, penetration testing, security assessments, and continuous nd awareness provide relevant lied to problem view performance by observing trends, identifying and prioritizing corrective actions, and directing the application of those corrective actions based available resources. The measures development process, described in Section 5, ensures that measures are developed with the purpose of identifying causes of poor anizational and ormation security nstrating for resource countability for e implemented lysis processes can lementation within cific information systems. surement program
  • 47. ystems and Information security measures can assist with determining the effectiveness of implemented information security processes, procedures, and security controls by relating results of information security activities and events (e.g., incident data, revenue lost to cyber attacks) to security controls and information security investments. Demonstrate Compliance: Organizations can demonstrate compliance with applicable laws, rules, and regulations by implementing and maintaining an information security measurement program. Information security measures will assist in satisfying the annual FISMA reporting activity that is being measured. Data required for calculating measures must be readily obtainable, and the proce consideration needs to be measurable. Only processes that can be consistent an should be considered for measurement. Even though the processes may be repea measurable data may be difficult to obtain if the processes and their performanc documented. Measures must use easily obtainable data to ensure that the burde on the organization does not defeat the purpose of measurement by absorbing r be needed elsewhere. Examples of information security activ monitoring. Other assessment activities (such as the effectiveness of a training a program) can also be quantified and used as data sources for
  • 48. measures. To be useful in tracking performance and directing resources, measures need to performance trends over time and point to improvement actions that can be app areas. Management should use measures to re on risk mitigation factors and performance and point to appropriate corrective actions. 3.2 Benefits of Using Measures An information security measurement program provides a number of org financial benefits. Major benefits include increasing accountability for inf performance; improving effectiveness of information security activities; demo compliance with laws, rules and regulations; and providing quantifiable inputs allocation decisions. Increase Accountability: Information security measures can increase ac information security by helping to identify specific security controls that ar incorrectly, are not implemented, or are ineffective. Data collection and ana facilitate identification of the personnel responsible for security controls imp specific organizational components or for spe Improve Information Security Effectiveness: An information security mea
  • 49. will enable organizations to quantify improvements in securing information s demonstrate quantifiable progress in accomplishing agency strategic goals and objectives. 10 requirement to state performance measures for past and current fiscal years. A information security measures can be used as input into the Government Acco (GAO) and Inspectors General (IG) audits. Implementation of an information s measurement program will demonstrate agency commitment to proactive inform dditionally, untability Office ecurity ation security. It will also greatly reduce time spent by agencies in collecting data, which is routinely requested raints and market n such an rity infrastructure. a comprehensive risk ased decision ss. It will allow ation security
  • 50. allocation for future sing the results of the measures analysis, program managers and system owners can isolate problems, use collected data to justify investment requests, and then target lly to the areas in need of improvement. By using measures to target security investments, these measures can aid organizations in obtaining the best value from s information security program determines the type of measures istence and rogram matures, its ome more ta that can be used for information ty programs need to surement. More the most mature ine the effect of An information security program is dependent upon upper-level management support to define its goals and objectives. These goals and objectives may be expressed through information security policies and processes at the program’s inception, or in a variety of other sources. (Goals and objectives are addressed in more detail in Sections 4.1 and 5.2.) Information security
  • 51. policies are documented, and information security procedures begin to stabilize, as the program is implemented and begins to mature. To be useful, information security measurement requires existence of documented procedures and some available data on the implementation of security controls. by the GAO and IG during audits and for subsequent status updates. Provide Quantifiable Inputs for Resource Allocation Decisions: Fiscal const conditions compel government and industry to operate on reduced budgets. I environment, it is difficult to justify broad investments in the information secu Information security investments should be allocated in accordance with management program. Use of information security measures will support risk-b making by contributing quantifiable information to the risk management proce organizations to measure successes and failures of past and current inform investments, and should provide quantifiable data that will support resource investments. U investments specifica available resources. 3.3 Types of Measures The maturity of an organization’
  • 52. that can be gathered successfully. A program’s maturity is defined by the ex institutionalization of processes and procedures. As an information security p policies become more detailed and better documented, the processes it uses bec standardized and repeatable, and the program produces a greater quantity of da for performance measurement. Figure 3-1 depicts this continuum by illustrating measurement considerations security programs. As Figure 3-1 illustrates, less mature information securi develop their goals and objectives before being able to implement effective mea mature programs use implementation measures to evaluate performance, while programs use effectiveness/efficiency and business impact measures to determ their information security processes and procedures. 11 A mature program normally uses multiple tracking mechanisms to doc various aspects of its performance. As more data becomes available, the d measurement decreases and the ability to automate data collection increases. automatio Figure 3-1. Information Security Program Maturity and Types
  • 53. of Mea ument and quantify ifficulty of Data collection n depends on the availability of data from automated sources versus the availability of naires and ata is available ols, certification ered to be fully automated when all data is gathered by automated data sources without human involvement or intervention. Types of measures (implementation, effectiveness/efficiency, and impact) that can realistically be obtained and are useful for performance improvement depend on the maturity of the security control implementation. Although different types of measures can be used simultaneously, the primary focus of information security measures shifts as implementation of the information security program matures. As information security program goals and strategic plans are surement data input by personnel. Manual data collection involves developing question conducting interviews and surveys with the organization’s staff. More usable d
  • 54. from semi automated and automated data sources—such as self- assessment to and accreditation (C&A) databases, and incident reporting/response databases—as an information security program matures. Measures data collection is consid 12 documented and implemented, the ability to reliably collect the outcome of t improves. As an organization’s information security program evolves and perfo becomes more readily available, measures will focus on program effectiveness operational results of security control implementation. Once information security is integrated into an organization’s processes, the processes become repeatable, measu becomes fully automated, and the mission or business impact of information security-related actions heir implementation rmance data /efficiency and the rement data collection and events can be determined by analyzing and correlating the measurement data. Appendix A contains examples of implementation, effectiveness/efficiency, and impact
  • 55. information security xamples of ercentage of ge of information password policies configured as required. At first, the results of these measures t. At this point, the iency and he percentage of ults of this system-level results reach and lly implemented t activities can refocus on other ter most implementation measures reach and remain at 100 er fully retire curity controls that improvement; however, as an organization matures, the emphasis and resources of the measurement program should shift away from implementation and towards measures. formation security program activities. 3.3.2 Effectiveness/Efficiency Measures
  • 56. Effectiveness/efficiency measures are used to monitor if program-level processes and system- level security controls are implemented correctly, operating as intended, and meeting the desired outcome. These measures concentrate on the evidence and results of assessments and may require multiple data points quantifying the degree to which information security controls are measures. 3.3.1 Implementation Measures Implementation measures are used to demonstrate progress in implementing programs, specific security controls, and associated policies and procedures. E implementation measures related to information security programs include the p information systems with approved system security plans and the percenta systems with might be less than 100 percent. However, as the information security program and its associated policies and procedures mature, results should reach and remain at 100 percen organization should begin to focus its measurement efforts on effectiveness/effic impact measures. Implementation measures can also examine system-level areas— for example, t servers within a system with a standard configuration. At first, the res measure will likely be less than 100 percent. When the implementation measure
  • 57. remain at 100 percent, it can be concluded that the information systems have fu the security controls addressed by this measure, and measuremen controls in need of improvement. Af percent, the organization should begin to focus its measurement efforts on effectiveness/efficiency and impact measures. Organizations should nev implementation measures because they are effective at pointing out specific se are in need of effectiveness/efficiency and impact Implementation measures require data that can be easily obtained from information security assessment reports, quarterly and annual FISMA reports, plans of action and milestones (POA&M), and other commonly used means of documenting and tracking in 13 implemented and the resulting effect(s) on the organization’s information secu example, the percentage of enterprise operating system vulnerabilities for whic been applied or that have been otherwise mitigated is both an implementation measure. It measures the implementation of the security control Flaw Remediati 800-53 because the result of the measure demonstrates whether or not vulne
  • 58. mitigated through patches or other means. At the same time, the result of the Secu rity posture. For h patches have and effectiveness on (SI-2) in SP rabilities are indicates the effectiveness rity Alerts and Advisories (SI-5) security control because any result less than the lly mitigate mentation imeliness of the ure—percentage idents caused by improperly configured access controls—relies on ecurity controls: AU-6); and Monitoring omponents that the efficiency of the ort (SA-3). rity decision sions. These measures can offer more,
  • 59. onitoring efforts ess of security controls. The results of effectiveness/efficiency measures can be used to ascertain whether selected security controls are and are helping facilitate corrective action prioritization. gram activities in a manner that can an organization’s -specific since each organization has a mission, impact measures can be used to quantify: • Cost savings produced by the information security program or through costs incurred from addressing information security events; • The degree of public trust gained/maintained by the information security program; or • Other mission-related impacts of information security. target indicates a lack of ability to receive alerts and use them to successfu vulnerabilities. Effectiveness/efficiency measures address two aspects of security control imple results: the robustness of the result itself, referred to as effectiveness, and the t result, referred to as efficiency. For example, the effectiveness/efficiency meas
  • 60. of information security inc information regarding the implementation and effectiveness of the following s Incident Monitoring (IR-5); Audit Monitoring, Analysis, and Reporting ( Configuration Changes (CM-4). Additionally, the effectiveness/efficiency measure—the percentage of system c undergo maintenance on schedule—relies on information regarding following security controls: Periodic Maintenance (MA-2) and Life Cycle Supp Effectiveness/efficiency measures provide key information for information secu makers about the results of previous policy and acquisition deci insight for improving performance of information security programs. Further effectiveness/efficiency measures can be used as a data source for continuous m because they help determine the effectiven functioning properly Effectiveness/efficiency measures may require fusing information security pro data with the data obtained from automated monitoring and evaluation tools be directly tied to security controls implementation. 3.3.3 Impact Measures Impact measures are used to articulate the impact of information security on mission. These measures are inherently organization
  • 61. unique mission. Depending upon the organization’s 14 These measures combine information about the results of security controls impl a variety of information about resources. They can provide the most direct ins of information security to the organization and are the ones that are sought out For example, the percentage of the agency’s information system budget devote security relies on information regarding the implementation, effectiveness, following NIST SP 800-53 security controls: Allocation of Resources (SA-2) a (SA-4). Another, more generalized budget-related impact measure would b information security investments reported to OMB in an ementation with ight into the value by executives. d to information and outcome of the nd Acquisitions e the number of Exhibit 300. Rather than examining the between the ocess.
  • 62. g a variety of resource information across the organization in a manner that can be directly tied to information security activities and events. Organizations embarking on information security performance measurement should be aware of e p make their program a success. These include specific organizational structure and processes as well as an understanding of required budget, personnel, security measures information security as ular basis (e.g., urce management, legal department) may need to be included in this process. (See ore information on stakeholders.) If an organizational element exists that is rformance measurement in general, the development and implementation of an t organization. If a pment and ply with the the implementing organization. Results of many information security activities can be quantified and used for performance measurement; however, since resources are limited and the majority of resources should be applied to correcting performance gaps, organizations should prioritize measurement requirements to ensure that a limited number of measures are
  • 63. gathered. Each stakeholder should be responsible for as few measures as possible—usually two to three measures per stakeholder. This helps ensure that the measures that are collected are meaningful, yield impact and outcome findings, and provide stakeholders with the time necessary to use the results to address performance gaps. As the program matures and target levels of measurement are reached, impact of a security control or controls, this measure evaluates the relationship portfolio of information security investments and the budget pr Impact measures require trackin 3.4 Measurement Considerations several considerations that can h l and time resources. 3.4.1 Organizational Considerations Appropriate stakeholders must be included in the development of information and program implementation. Organizational elements that do not have their primary responsibility but interact with information security on a reg training, reso Section 5.1 for m responsible for pe information security measurement program should be coordinated with tha process exists for approving organization-wide data calls and
  • 64. actions, develo implementation of the information security measurement program should com existing process. 3.4.2 Manageability Any information security measurement program must be manageable for 15 obsolete measures should be phased out and new ones that measure completion of more current items should be used. New measures will also be required and effectiveness if the organization’s mission is redefined or if changes are made to information security policies and guidelines. repositories used should be incident-reporting lements, or if f standardizing s cannot be overemphasized. When organizations are developing and ecurity measurement
  • 65. to facilitate the ts of rity measurement ose of ation security measures must be as nonintrusive as possible— and of maximum usefulness s rather than collect data. substantial imize its benefits. sources to maintain the program. Finally, the information contained in information security data repositories represents a y of this data, ected n tion. Automating ps institutionalize automated data lections are likely to be housed in a centralized database or similar data repository. As a complement to automating performance measurement, organizations should also consider how performance measurement automation can supplement other automated information security
  • 66. tasks. For example, Extensible Markup Language (XML)- formatted configuration checklists can allow organizations to use Commercial Off-The-Shelf (COTS), Government Off-The-Shelf (GOTS), or open-source tools to automatically check their information security configuration and map it to technical compliance requirements. While these checklists are primarily used for 3.4.3 Data Management Concerns To ascertain the quality and validity of data, data collection methods and data for measures data collection and reporting, either directly or as data sources, standardized. The validity of data is suspect if the primary data source is an database that stores only the information reported by a few organizational e reporting processes between organizations are inconsistent. The importance o reporting processe implementing processes that may serve as inputs into an information s program, they must ensure that data gathering and reporting are clearly defined collection of valid data. Organizations must understand that although they may collect substantial amoun information security data, not all data will be useful for their information secu program at any given point in time. Any data collection specifically for the purp inform to ensure that available resources are used primarily to correct
  • 67. problem Establishment of an information security measurement program will require a investment to ensure that the program is implemented in a way that will max Benefits of the program are expected to outweigh the costs of investing re significant collection of operational and vulnerability data. Due to the sensitivit information security performance measurement data repositories need to be prot accordingly. 3.4.4 Automation of Measurement Data Collectio Efficient data management is facilitated by automating measurement data collec measurement data collection standardizes data collection and reporting, and hel measurement activity by integrating it into business processes. In addition, collection minimizes opportunities for human error, leading to greater accuracy of available data. Standardized collection and reporting can also increase data availability, as col 16 compliance with regulations such as FISMA, they can also be used to map s control settings to the corresponding NIST SP 800-53 security controls, which c verification of compliance more consistent and efficient. For
  • 68. example, a check the password strength settings on a system and report whether or not those sett requirements specified in NIST SP 800-53. The results of such automated dat provide dynamic updates t pecific technical an make the list could examine ings meet a collection could o an agency’s automated information security performance measures to indicate if information security targets are being achieved and where corrective actions and ety of environments and perational ystem development life ocesses; and n be applied to organizational units, sites, or other organizational constructs. Organizations should carefully define the scope of their information c goals and ram maturity. measurement can be applied at the information system level to provide
  • 69. quantifiable data regarding the implementation, effectiveness/efficiency, or impact of required or ation system owners can use measures to support the determination of the information system’s security posture, demonstrate compliance with ent. Information security k assessments, rting activities, or 3.5.2 System Development Life Cycle Information security measurement should be used throughout the SDLC to monitor implementation of appropriate security controls. Formalized measurement of information security during the SDLC provides information to the project manager that is essential to understanding how well information security is integrated into the SDLC and to what degree vulnerabilities are being introduced into the information system. Different measures may be mitigation activities are required. 3.5 Information Security Measurement Program Scope An information security measurement program can be scoped to a vari needs: • Quantifying information system-level security performance for an o information system;
  • 70. • Quantifying the integration of information security into the s cycle (SDLC) during information system and software development pr • Quantifying enterprise-wide information security performance. Information security measures ca security measurement program based on specific stakeholder needs, strategi objectives, operating environments, risk priorities, and information security prog 3.5.1 Individual Information Systems Information security desired security controls. Inform organizational requirements, and identify areas in need of improvem measurement can support certification and accreditation activities (e.g. ris information system security plans, and continuous monitoring), FISMA repo capital planning activities. 17 useful for different project activities. The following table provides examples of information security measu ty of project activities.
  • 71. T ement D ystem Devel nt3 res that can be used during the SDLC for a varie able 1. Measur uring S opme SDLC Phase Relevant Measures Purpose Value Acquisition/Dev defects that negatively impact the security posture of the system des insight into the effectiveness of life cycle es and information security training for evelopers cates need for additional rity controls in operations elopment • Percentage of product • Identify software defects that may • Provi be exploited in the future process d
  • 72. • Indi secu Acquisition/Dev security requirements (i.e., security controls implemented) that are mapped to design des insight into ion of information rity requirements in releases Provides insight into complexity of information curity implementation s short- and long- for additional security controls in operations elopment • Percentage of information • Determine if security • Provi inclus requirements are being planned and implemented
  • 73. secu early • se • Indicate term need Acquisition/Dev ount of monitoring required ides insight into bility of inherent vulnerabilities and increased enterprise risk elopment • Number of en for a module the minimum try points (should be necessary) • Fewe poi am r entry nts reduces the
  • 74. • Prov possi Acquisition/Dev discovered are known as ilities overflows ting) viations sign, code, ents er of defects and the area of the code in which they were found (it is a higher risk to have the defects between or other interfaces) • Percent of discovered vulnerabilities that have been mitigated • Proactively address security defects prior to testing and implementation • Helps minimize development and
  • 75. maintenance rework costs elopment defects that software vulnerab (e.g., buffer and cross-site scrip • Number of de • Number of between de and requirem • Numb components, unit seams, 3 These measures were developed in collaboration with Department of Homeland Security Software Assurance Program. 18 SDLC Phase Relevant Measures Purpose Value Acquisition/Dev informatio activities t into cost d schedule risks to project
  • 76. s es accuracy in ng of future projects elopment • Cost/schedule variance in n security • Moni an tor planning • Provides insigh d implementation of an succes security activities • Increas planni Implementati in erabilities • Percentage of failed security control e future t into risk of being exploited when implemented
  • 77. • Indicates need for additional security controls in tions on/Assessment • Percentage of that conta vuln modules • Identify software defects that may be exploited in th • Provides insigh the system requirements opera Collecting and analyzing these types of measures will help the project manager in the following ine if software defects that may impact information security are being identified more secure design • Identify and investigate trends that require corrective actions, such as training or revising ty controls; and • Track trends in information security risk throughout the SDLC. Collecting, analyzing, and reporting appropriate security
  • 78. measures during the SDLC can be used elopment effort to rather than added Information security measurement can be implemented on an enterprise-wide level to monitor the implementation, effectiveness/efficiency, and impact on the organization’s information security activities. Enterprise-level measures may be derived by aggregating multiple information system-level measures or developed by using the entire enterprise as the scope. For an enterprise-wide measurement to be effective, the organization must operate at a certain level of maturity to ensure that processes the measures depend upon are consistent, repeatable, and can ensure availability of data across the enterprise. manner: • Determ early in the life cycle where they are more cost-effective to fix; • Identify and remove potential vulnerabilities in software and develop practices; poorly written and confusing procedures; • Determine if the information system will comply with required securi to improve integration of information security into the
  • 79. information system dev increase the overall assurance that system security requirements are built in later. 3.5.3 Enterprise-Wide Programs 19 4. LEGISLATIVE AND STRATEGIC DRIVERS This section explains the relationship between overall agency performance mea and information security performance measures reporting, and provides agen on how to link these two activities to ensure that their information secur to overall accomplishment of the agency mission, goals, and objectives. Section provide an overview of the Government Performance Results Act (GPRA), the Information Security Management Act (FISMA), and the Federal Enterprise A sures reporting cies with guidelines ity program contributes s 4.1 and 4.2 Federal rchitecture from a performance measurement point of view and describe their associated performance management
  • 80. 4.3 discusses the linkage between enterprise strategic planning and information security. ns, is driving an increased purpose of these ations, improve efficiencies in e value of these services to the public. Agencies are tives and make these plans and corresponding velops initiatives 4.1.1 Government Performance Results Act tructure and facilitate nually e federal gencies accountable for achieving gram performance reform with a series of pilot projects in setting program goals, measuring program performance against those goals, and reporting publicly on their progress; • Improve federal program effectiveness and public accountability by promoting a new focus on results, service quality, and customer satisfaction; • Help federal managers improve service delivery by requiring that they plan for meeting program objectives, and by providing them with information about program results and
  • 81. service quality; requirements, while Section 4.1 Legislative Considerations Legislation such as GPRA and FISMA, along with executive regulatio emphasis on managing, quantifying, and reporting agency performance. The efforts is to facilitate the streamlining of U.S. government oper delivering services, and demonstrate th required to strategically plan their initia performance measures available to the public. The Executive Branch also de that may require organizations to collect and report performance measures. GPRA focuses on improving program effectiveness and efficiency by adequately articulating program goals and providing information on program performance. To s program improvement, it requires agencies to develop multiyear strategic plans and an report their performance against these plans. The purpose of GPRA is to: • Improve the confidence of the American people in the capability of th government by systematically holding federal a program results; • Initiate pro 20
  • 82. • Improve congressional decision making by providing more objec achieving statutory objectives and by r tive information on eporting on the relative effectiveness and nd culminates in A puts this g and Investment Control (CPIC) plishes and how well the accomplishments match with the program’s purpose and objectives.”5 formance planning processes, agencies should: anagement and means to track e against agency goals and objectives and measurable performance targets. Agencies can demonstrate the impact of information security on their missions by aligning information mation security goals and objectives. d Execution of the Management Act
  • 83. urate with the ormation ementing and The purpose of FISMA is to: ness of security controls over information resources that support federal operations and assets; • Recognize the highly networked nature of the current federal computing environment and provide effective government wide management and oversight of related information efficiency of federal programs and spending; a • Improve internal management of the federal government.4 GPRA mandates agencies to conduct strategic and performance planning that annual submissions of strategic plans and performance measures reports. GPR planning in the context of the overall agency Capital Plannin process by emphasizing “managing for results—what the program accom As a part of their annual strategic and per • Define their long-term and annual goals and objectives; • Set measurable targets of performance; and
  • 84. • Report their performance against goals and objectives to the Office of M Budget (OMB) on a quarterly basis. This performance measures reporting directly supports GPRA by providing a performanc security performance measures with their infor GPRA is implemented by OMB Circular A-11, Preparation, Submission, an Budget, Part 6. 4.1.2 Federal Information Security FISMA requires federal agencies to provide appropriate protection of their resources through implementing a comprehensive information security program that is commens sensitivity of the information being processed, transmitted, and stored by agency inf systems. It also requires agencies to assess and report their performance in impl managing their information security programs. • Provide a comprehensive framework for ensuring the effective 4 Public Law 103-62, Government Performance and Results Act of 1993. 5 OMB Circular A-11, Preparation, Submission, and Execution of the Budget, 2005, Section 15, clause 15.5. 21
  • 85. security risks, including coordination of information security efforts throughout the nce of minimum security controls required to on security cts offer advanced, ic security that are re information s should be made by individual agencies from among commercially developed products.6 nes pertaining to s and define and ources. It also requires rity programs. enables agencies to ormation security stems that are certified and accredited, the percentage of their personnel that have taken required g requirements. A information security measurement program also enables
  • 86. agencies to satisfy any new easures reporting requirements required internally or r information security data collection, analysis, quantification, d quarterly FISMA 4.2 Federal Enterprise Architecture security performance measurement requirements, the Executive Branch periodically implements initiatives designed to monitor and improve the effectiveness of federal organizations. One such Executive Branch initiative that relies on information security measures is the Federal Enterprise Architecture (FEA). One of FEA’s reference models is the Performance Reference Model (PRM). The PRM is a standardized civilian, national security, and law enforcement communities; • Provide for the development and maintena protect federal information and information systems; • Provide a mechanism for improved oversight of federal agency informati programs; • Acknowledge that commercially developed information security produ dynamic, robust, and effective information security solutions for the protection of critical information infrastructures important to national defense and econom designed, built, and operated by the private sector; and
  • 87. • Recognize that the selection of specific technical hardware and softwa security solution FISMA also mandated NIST to develop and promulgate standards and guideli federal information systems. FISMA requires agencies to identify and assess risks to their information system implement appropriate security controls to protect their information res agencies to report quarterly and annually on the status of their information secu An institutionalized information security performance measurement program collect and report on relevant FISMA performance indicators. For example, inf performance measures enable agencies to quickly determine the percentage of their sy information security training, and their compliance with other FISMA reportin mature information security performance m externally by providing a basis fo and reporting. OMB publishes annual guidelines on the process and elements of annual an reporting. In addition to legislative information
  • 88. 6 Public Law 107-347, E-Government Act of 2002, Title III 22 framework to measure the performance of major IT investments and their contribution to implementation into FEA efforts to reduce duplication of data collection and facilitate integration rity gic planning lly established, each with lished. As a part of mplishment of their measure. Information security performance measures provide a means to monitor and report on an rformance ctiveness of ency’s mission. hich are defined ecurity must be d to at least one goal or objective in the strategic planning process to demonstrate its ablished by rity requirements
  • 89. ishing these goals and performance ed at multiple levels within an organization—including the overall agency information security program, operating bureau information security programs, or individual agency programs. They can also be scoped to different types of efforts, as discussed in Section 3.6. Measures developed at different levels of an organization should be used for internal management and process improvement purposes. They may also be aggregated to agency-level information security program performance measures. Agency-level measures will either be reported to the organization’s upper management or used for external reporting—such as GPRA and FISMA. program performance. Organizations should consider tying information security measures development and of information security into their enterprise architectures. 4.3 Linkage Between Enterprise Strategic Planning and Information Secu Federal agencies develop their long-term strategic goals as part of their strate process—a requirement of GPRA. Five to six strategic goals are usua several performance objectives that describe how the goal will be accomp
  • 90. this process, agencies develop performance measures to quantify the acco goals and objectives with quarterly and annual targets for each performance agency’s implementation of its information security program and associated pe measures as mandated by FISMA. These measures can also help assess the effe security controls in protecting agency information resources in support of the ag Ultimately, all efforts must support the agency’s overall goals and objectives, w and reassessed annually during its strategic planning activities. Information s explicitly tie importance in accomplishing the agency’s mission. This connection can be est identifying goals and objectives that would articulate agency information secu within the context of the overall agency mission. Progress toward accompl objectives may be monitored by implementing appropriate information security measures. Information security performance measures can be developed and us 23 5. MEASURES DEVELOPMENT PROCESS
  • 91. ce measures n during early in the process is more effective than ions for setting up an • Selecting the measures most appropriate for the organization’s strategy and business vironment, and s; ation to, all relevant stakeholders; and ce, including the establishment ent al set of measures as well as selection of the measures subset that is surement program ects of information s section describes the 6 describes the information security measurement n a larger organizational context and demonstrates that they can be used to progressively measure the implementation, ctivities within r activities:
  • 92. • Identification and definition of the current information security program; and • Development and selection of specific measures to gauge the implementation, effectiveness, efficiency, and impact of the security controls. The activities outlined in Figure 5-1 need not be done sequentially. The process is provided as a way to think about measures and facilitate the identification of measures tailored to a specific organization and its different stakeholder groups. The benefit of devoting the time to set up an information security performan program in advance is similar to that of allowing time for requirements definitio information system development—investing time retrofitting requirements once the effort is under way. Important considerat information security performance measures program include: environment, including mission and information security priorities, en requirement • Taking time to collect input and get buy-in from, and provide educ • Ensuring that appropriate technical and process infrastructure is in pla creation/modification of data collection, analysis, and reporting tools. Two processes—measures development and measures
  • 93. implementation—guide and operation of an information security measurement program. The measures developm process establishes the initi appropriate for an organization at a given time. The information security mea implementation process is iterative by nature and ensures that appropriate asp security are measured for a specific time period. The remainder of thi measures development process. (Section program implementation process.) Figure 5-1 illustrates the place of information security measures withi effectiveness/efficiency, and business impact of information security a organizations or for specific information systems. The information security measures development process consists of two majo 24 Figure 5-1. Information Security Measures Development Pr 5.1 Stakeholder Interest Identification ocess f the measures development process (see Figure 5-1) identifies relevant stakeholders
  • 94. s in information security measurement. Anyone within an organization can be me individuals or groups have a greater stake s. The primary information security stakeholders are: ystem administrator/network administrator; • Information system support personnel. Secondary information security stakeholders are members of groups within an organization that do not have information security as their primary mission but are involved with information security in some aspects of their operations. Examples of secondary information security stakeholders may include: • Chief Financial Officer (CFO); Phase 1 o and their interest an information security stakeholder, although so than other • Agency Head; • CIO; • SAISO/CISO; • ISSO; • Program manager/information system owner;
  • 95. • Information s • Security engineers; and 25 • Training organization; • Human resources/personnel organization; ilities. ts of their particular ay require an ’s information be determined through ent reviews. In erenced in Section res. It is ended that fewer measures per stakeholder be used when an organization is establishing uld gradually ement program evelopment to urity performance. system security ram’s overall success. ency/effectiveness,
  • 96. utive will be ission impact of information security activities (e.g., What is the monetary and public trust cost of the latest incident? Is there an article about us in a major and program managers will be interested in the effectiveness/efficiency of information security programs (e.g., Could we have prevented the work administrators ps to avoid or 5.2 Goals and Objectives Definition Phase 2 of the measures development process (see Figure 5-1) is to identify and document hat would guide security control implementation for the information security program of a specific information system. For federal information systems, these goals and objectives may be expressed in the form of high- level policies and requirements, laws, regulations, guidelines, and guidance.7 • Inspectors General (IG); and • Chief Privacy Officer or other designated official with privacy responsib Stakeholder interests will differ, depending on the information security aspec role and their position within the organizational hierarchy.
  • 97. Each stakeholder m additional set of customized measures that provides a view of the organization security performance within their area of responsibility. Interests may multiple venues, such as interviews, brainstorming sessions, and mission statem many cases, stakeholder interests are driven by laws and regulations. As ref 3.4.2, each stakeholder should initially be responsible for two to three measu recomm an information security program; the number of measures per stakeholder sho increase as the information security program and information security measur mature. Stakeholders should be involved in each step of information security measures d ensure organizational buy-in to the concept of measuring information sec This involvement will also ensure that a sense of ownership of the information measures exists at multiple levels of the organization to encourage the prog The three measurable aspects of information security—business impact, effici and implementation—speak to different stakeholders. For example, an exec interested in the business and m newspaper?), information security incident? How fast did we respond to it?), and information
  • 98. systems or net will want to know what went wrong (e.g., Have we performed all necessary ste minimize the impact of the incident?). information system security performance goals and objectives t 7 See Section 4 for additional information on requirements, laws, regulations, guidelines, and guidance. 26 Information security program goals and objectives can also be derived f goals and objectives in support of the overall organization’s mission, wh articulated in agency strategic and performance plans. Applicable docu reviewed to identify and extract applicable information security performance goals and objecti rom enterprise-level ich are usually ments should be ves. Extracted goals and objectives should be validated with the organizational stakeholders to ensure their acceptance of, and participation in, the measures development quirements for
  • 99. um security ing to low- gencies must define rocessed, stored, and programs must entation and it linkage of s can use in FIPS 200, as an input into objectives ese specifications, which rovided in Appendix D. rammatic and nization-specific emented are efine a baseline of information security practices for the information system. Specifically, they describe how niques lead to accomplishing information security performance goals and objectives. These documents should be examined not only ies when the ents should be d targets of performance.
  • 100. 5.4 Information Security Program Implementation Review In Phase 4 of the measures development process (see Figure 5- 1), any existing measures and data repositories that can be used to derive measures data should be reviewed. Following the review, applicable information should be extracted and used to identify appropriate implementation process. Federal Information Processing Standard (FIPS) 200, Minimum Security Re Federal Information and Information Systems, provides specifications for minim requirements. NIST SP 800-53 provides minimum security controls correspond impact, moderate-impact, and high-impact categories as defined in FIPS 199, Standards for Security Categorization of Federal Information and Information Systems. A and implement minimum security controls based on the sensitivity of data p transmitted on their information systems. As such, agency information security include planning, implementing, monitoring, and reporting on the implem effectiveness of these information system security controls. To facilitate explic information security activities with agency-level strategic planning, agencie specifications for minimum security requirements, stated for developing information security performance measures. (Th correspond to the 17 security control families in NIST SP 800- 53, are p Appendix A provides candidate information security measures
  • 101. from both prog system-level perspectives, with corresponding goals and objectives.) 5.3 Information Security Policies, Guidelines, and Procedures Review Phase 3 of the measures development process (see Figure 5-1) focuses on orga information security practices. Details of how security controls should be impl usually set forth in organization-specific policies and procedures that d implementing security controls, requirements, and tech during initial measures development, but in future measures development activit initial list of measures is exhausted and needs to be replaced. Applicable docum reviewed to identify information security controls, applicable processes, an 27 evidence to support measures development and data collection.8 Implementat points to aspects of security controls that would be indicative of the informatio performance objective being met, or at least that actions leading to the accompl performance objective in the future are performed. The information system security
  • 102. ion evidence n security ishment of the requirements, processes, and procedures that have been implemented can be extracted by n. ay contain information from which measures data can be generated: ;9 est GAO and IG findings; ed activities, such as incident handling and it logs, and network and information system nts and penetration testing results; curity assessment reports); results; • Training results and statistics. As information system security practices evolve and the documents that describe them change, o ensure that the newly e examined to Phases 5, 6, and 7 of the measures development process, depicted in Figure 5-1, involve developing measures that track process implementation, efficiency/effectiveness, and mission
  • 103. ion describes how to develop measures in these three areas for information security. (Appendix A provides to selected security control families in NIST SP 800-53.) To support continuous improvement of security for information systems and programs, the process explicitly connects information security activities to the organization’s strategic goals consulting multiple sources, including documents, interviews, and observatio The following sources m • System Security Plans • Plan of Action and Milestones (POA&M) reports; • Lat • Tracking of information security-relat reporting, testing, network management, aud billing; • Risk assessme • C&A documentation (e.g., se • Continuous monitoring • Contingency plans; • Configuration management plans; and
  • 104. existing measures will be retired and new measures will be developed. T developed measures are appropriate, these and similar documents will need to b identify new areas that should be captured in measures. 5.5 Measures Development and Selection impact. The performance ures development process presented in this sectmeas candidate measures, some of which correspond 8 Implementation evidence refers to the data collected to support an information security performance measure. Implementation evidence is discussed in greater detail in Table 2 contained in Section 5.6. 9 NIST SP 800-18 provides guidelines on System Security Plan development. 28 Organizations manage what they measure. It is important to select two to three high- priority measures per stakeholder, determined by using a risk-based approach.
  • 105. sumes that ave multiple strategic goals, and that a single goal may require inputs from multiple measures. n security urity control, a easures that help determine where a given organization stands in support of the corresponding strategic asured, provide a rols should: • Use data describing the security control’s implementation to generate required measures th overall information security program performance should: ity goals and objectives that may encompass performance of information security across the spectrum of security controls; and generate measures. tin res, will be quite large. nsure that the set mentation has the security approach. “High priority” may be defined by the
  • 106. latest GAO or IG reports, results of a risk assessment, through continuous monitoring, or based on an internal organizational goal. • Uses data that can realistically be obtained from existing sources and data repositories (e.g., system inventories, training databases, POA&Ms). through development and use of performance measures. This approach as organizations h 5.5.1 Measures Development Approach Depending on the scope of the measurement effort, development of informatio measures should focus on gauging the security performance of a specific sec group of security controls, or a security program. Such an approach will result in m objective—and, when multiple controls or the entire program are being me broad view of information security performance. Measures corresponding to security control families or individual security cont • Be mapped directly to the individual security control(s); such as POA&M, testing, and project tracking; and • Characterize the measure as applicable to low, moderate, or high information system categorization.
  • 107. Measures dealing wi • Be mapped to information secur • Use the data describing the information security program performance to required 5.5.2 Measures Prioritization and Selection The universe of possible measures, based on exis Measures must be prioritized to e g policies and procedu selected for initial imple following qualities: • Facilitates improvement of high-priority control implementation as defined using a risk-based 29 • Measures processes that already exist and are established. Measuring i processes will not provide meaningful data about information security p will not be useful for targeting specific aspects of performance. Howeve such measurement may still be useful to attain a baseline to be closely m nconsistent erformance and
  • 108. r, attempting onitored through continuous assessment and further measurement to improve the information security ce of selected y program portance in the Weight should be based on the overall risk mitigation goals and would likely reflect higher criticality of enterprise-level initiatives versus is a useful tool that facilitates the integration of information security measures into the departmental capital planning process. ation security ch success is measured. The rformance easures implementation is complex because te f performance for ation of security events on its An organization nd should be ready to adjust
  • 109. these targets, based on actual measurements, once they are obtained. The organization may also decide not to set targets for these measures until the first measurement is collected that can be used as a performance baseline. Once the baseline is obtained and corrective actions identified, appropriate measurement targets and implementation milestones that are realistic for a specific system environment can be defined. If performance targets cannot be established after the baseline has been obtained, management should evaluate whether the measured activities and corresponding measures are providing the expected value for the organization. posture. Organizations may decide to use a weighting scale to differentiate the importan measures and ensure that results accurately reflect existing information securit priorities. This would involve assigning values to each measure based on its im context of the overall information security program. smaller-scale initiatives. This scale 5.5.3 Establishing Performance Targets Establishing performance targets is an important component of defining inform measures. Performance targets establish a benchmark by whi degree of success is based on the proximity of the measure result to the stated pe target. The mechanics of establishing performance targets
  • 110. differ for implementation m and the other two types of measures (effectiveness/efficiency and impact). For measures, targets are set to 100 percent completion of specific tasks. Setting performance targets for effectiveness/efficiency and impact measures management will need to apply qualitative and subjective reasoning to determine appropria levels of security effectiveness and efficiency, and use these levels as targets o applicable measures. Although every organization desires effective implement controls, efficient delivery of security services, and minimal impact of security mission, the associated measurements will be different for different systems. can attempt to establish performance targets for these measures a 30 This template and the candidate measures provided in Appendix A are examples, and are meant to be tailored to fit the needs of the organization. gets of vailable. Trends
  • 111. existed previously, ommendations ndustry, when published, may provide a means of setting targets. Figure 5-2 provides an example of an implementation measure that is based on the percentage of approved system security plans. Establishment of effectiveness/efficiency and impact measures baselines and tar performance can be facilitated if historic data that pertains to these measures is a observed in the past will provide insight into ranges of performance that have and guide the creation of realistic targets for the future. In the future, expert rec and standards within the i Percentage of Approved System Security Plans 0% 20% 40% 60% 80% 100% Oct-05 Apr-06 Oct-06 Apr-07 Oct-07
  • 112. asu le easure evelop ndard fo n, analysis, and e, provided in Table 2, is an example of such a format. While the measures template provides a suggested approach for measurement, depending upon internal practices and procedures, organizations may tailor their own performance measurement templates by using a subset of the provided fields or adding more fields based on their environment and requirements. Figure 5-2. Information Security Me 5.6 Measures Development Template res Trend Examp s in a ment, rmat will Organizations should document their performance m standard format to ensure repeatability of measures d tailoring, collection, and reporting activities. A sta provide the detail required to guide measures collectio reporting activities. The measures templat
  • 113. 31 Table 2. Measures Template and Instructions Field Data Measure ID que identifier used for measure tracking and sorting. The unique identifier ly reference another State the uni can be from an organization-specific naming convention or can direct source. Goal stem-level security ntation for that s and information als can be derived hese goals are possible, include both the al extracted from agency at would contribute to Statement of strategic goal and/or information security goal. For sy control measures, the goal would guide security control impleme information system. For program-level measures, both strategic goal security goals can be included. For example, information security go
  • 114. from enterprise-level goals in support of the organization’s mission. T usually articulated in strategic and performance plans. When enterprise-level goal and the specific information security go documentation, or identify an information security program goal th the accomplishment of the selected strategic goal. Measure h the word ber,” “frequency,” “average,” or a similar term. red. Security tion Evidence. If the erate, or low), state Statement of measurement. Use a numeric statement that begins wit “percentage,” “num If applicable, list the NIST SP 800-53 security control(s) being measu controls that provide supporting data should be stated in Implementa measure is applicable to a specific FIPS 199 impact level (high, mod this level within the measure. Type ess/efficiency, or impact. Statement of whether the measure is implementation, effectiven Formula a measure. The ves as an input into the Calculation to be performed that results in a numeric expression of information gathered through listing implementation evidence ser formula for calculating the measure.